Analysis

  • max time kernel
    193s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 05:52

General

  • Target

    5c66b25b3e70174800ceb29c00733450ec54eac08a5cc2b0e66c4847b97b0e87.exe

  • Size

    205KB

  • MD5

    2e70061e9f2ddd5a4f4e7785ba55659e

  • SHA1

    2e9c08bc22b64bdfd3ed43620e10231ce589b008

  • SHA256

    5c66b25b3e70174800ceb29c00733450ec54eac08a5cc2b0e66c4847b97b0e87

  • SHA512

    a9ba810a6cb44735475c4c41da5312126589ef0bd192350caec2fb521041da3e437f6fbb05e2e59b2e200d8b2fe9d9f8d257f3d71b1fda3621b0b9eee1eeea03

  • SSDEEP

    3072:4qhMPssRhlARSOsdwD/98out3SDADeak7dJHB/AKG:4qhMPssRARoiSoS3SsQLH5AK

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Modifies system executable filetype association 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 10 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 10 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 64 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Loads dropped DLL 63 IoCs
  • Adds Run key to start application 2 TTPs 42 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c66b25b3e70174800ceb29c00733450ec54eac08a5cc2b0e66c4847b97b0e87.exe
    "C:\Users\Admin\AppData\Local\Temp\5c66b25b3e70174800ceb29c00733450ec54eac08a5cc2b0e66c4847b97b0e87.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4832
    • C:\Users\Admin\AppData\Local\Temp\5c66b25b3e70174800ceb29c00733450ec54eac08a5cc2b0e66c4847b97b0e87.exe 
      C:\Users\Admin\AppData\Local\Temp\5c66b25b3e70174800ceb29c00733450ec54eac08a5cc2b0e66c4847b97b0e87.exe 
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Sets file execution options in registry
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2152
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3616
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
          4⤵
          • Modifies WinLogon for persistence
          • Modifies system executable filetype association
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Sets file execution options in registry
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3840
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
            5⤵
            • Modifies system executable filetype association
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:464
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1932
            • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\nuxa.exe
              "c:\Documents and Settings\Admin\Application Data\Microsoft\nuxa.exe" csrss
              6⤵
              • Modifies system executable filetype association
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Adds Run key to start application
              • Enumerates connected drives
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:5040
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3012
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
              6⤵
              • Modifies WinLogon for persistence
              • Modifies system executable filetype association
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Sets file execution options in registry
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops file in System32 directory
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1364
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4404
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:4976
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2520
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:3388
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                PID:3332
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                PID:1616
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:4588
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1504
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:4772
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                PID:3444
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                7⤵
                • Suspicious use of FindShellTrayWindow
                PID:752
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe taskkill /f /im tati.exe
                7⤵
                  PID:2276
                • C:\Windows\SysWOW64\rundll32.exe
                  rundll32.exe taskkill /f /im wscript.exe
                  7⤵
                    PID:3284
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe taskkill /f /im sys.exe
                    7⤵
                      PID:5112
                    • C:\Windows\SysWOW64\rundll32.exe
                      rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                      7⤵
                        PID:1324
                      • C:\Windows\SysWOW64\rundll32.exe
                        rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                        7⤵
                          PID:2456
                        • C:\Windows\SysWOW64\rundll32.exe
                          rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                          7⤵
                            PID:4196
                          • C:\Windows\SysWOW64\ping.exe
                            ping www.rasasayang.com.my -n 65500 -l 1210
                            7⤵
                            • Runs ping.exe
                            PID:5072
                          • C:\Windows\SysWOW64\ping.exe
                            ping www.data0.net -n 65500 -l 1340
                            7⤵
                            • Runs ping.exe
                            PID:5076
                          • C:\Windows\SysWOW64\ping.exe
                            ping www.duniasex.com -n 65500 -l 1340
                            7⤵
                            • Runs ping.exe
                            PID:456
                      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        PID:456
                      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in System32 directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of SetWindowsHookEx
                        PID:4188
                        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                          6⤵
                          • Modifies WinLogon for persistence
                          • Modifies system executable filetype association
                          • Modifies visibility of file extensions in Explorer
                          • Modifies visiblity of hidden/system files in Explorer
                          • UAC bypass
                          • Disables RegEdit via registry modification
                          • Executes dropped EXE
                          • Sets file execution options in registry
                          • Loads dropped DLL
                          • Adds Run key to start application
                          • Checks whether UAC is enabled
                          • Drops file in System32 directory
                          • Modifies Internet Explorer settings
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          • System policy modification
                          PID:3148
                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • Suspicious use of SetWindowsHookEx
                            PID:2908
                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                              8⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:4336
                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:1812
                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                              8⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:1324
                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:3996
                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                              8⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:3140
                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:1520
                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                              8⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:4604
                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:2336
                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                              8⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:4180
                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:3428
                          • C:\Windows\SysWOW64\rundll32.exe
                            rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                            7⤵
                            • Suspicious use of FindShellTrayWindow
                            PID:2712
                          • C:\Windows\SysWOW64\rundll32.exe
                            rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                            7⤵
                              PID:4688
                            • C:\Windows\SysWOW64\ping.exe
                              ping www.rasasayang.com.my -n 65500 -l 1210
                              7⤵
                              • Runs ping.exe
                              PID:1616
                            • C:\Windows\SysWOW64\ping.exe
                              ping www.data0.net -n 65500 -l 1340
                              7⤵
                              • Runs ping.exe
                              PID:1720
                            • C:\Windows\SysWOW64\ping.exe
                              ping www.duniasex.com -n 65500 -l 1340
                              7⤵
                              • Runs ping.exe
                              PID:3580
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                              7⤵
                                PID:1368
                              • C:\Windows\SysWOW64\rundll32.exe
                                rundll32.exe taskkill /f /im tati.exe
                                7⤵
                                  PID:1672
                                • C:\Windows\SysWOW64\rundll32.exe
                                  rundll32.exe taskkill /f /im sys.exe
                                  7⤵
                                    PID:3304
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    rundll32.exe taskkill /f /im wscript.exe
                                    7⤵
                                      PID:3996
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                      7⤵
                                        PID:4456
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                                    5⤵
                                    • Suspicious use of FindShellTrayWindow
                                    PID:1492
                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                    5⤵
                                    • Loads dropped DLL
                                    • Drops file in System32 directory
                                    PID:3628
                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                    5⤵
                                      PID:4128
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                                      5⤵
                                        PID:1120
                                      • C:\Windows\SysWOW64\ping.exe
                                        ping www.rasasayang.com.my -n 65500 -l 1210
                                        5⤵
                                        • Runs ping.exe
                                        PID:4212
                                      • C:\Windows\SysWOW64\ping.exe
                                        ping www.data0.net -n 65500 -l 1340
                                        5⤵
                                        • Runs ping.exe
                                        PID:736
                                      • C:\Windows\SysWOW64\ping.exe
                                        ping www.duniasex.com -n 65500 -l 1340
                                        5⤵
                                        • Runs ping.exe
                                        PID:1708
                                      • C:\Windows\SysWOW64\rundll32.exe
                                        rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                                        5⤵
                                          PID:4172
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                          5⤵
                                            PID:1096
                                          • C:\Windows\SysWOW64\rundll32.exe
                                            rundll32.exe taskkill /f /im tati.exe
                                            5⤵
                                              PID:3492
                                            • C:\Windows\SysWOW64\rundll32.exe
                                              rundll32.exe taskkill /f /im wscript.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Drops file in System32 directory
                                              • Suspicious use of SetWindowsHookEx
                                              PID:4128
                                            • C:\Windows\SysWOW64\rundll32.exe
                                              rundll32.exe taskkill /f /im sys.exe
                                              5⤵
                                                PID:4220
                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:4444
                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2712
                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Drops file in System32 directory
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:3880
                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                              4⤵
                                              • Modifies WinLogon for persistence
                                              • Modifies system executable filetype association
                                              • Modifies visibility of file extensions in Explorer
                                              • Modifies visiblity of hidden/system files in Explorer
                                              • UAC bypass
                                              • Disables RegEdit via registry modification
                                              • Executes dropped EXE
                                              • Sets file execution options in registry
                                              • Loads dropped DLL
                                              • Adds Run key to start application
                                              • Checks whether UAC is enabled
                                              • Drops file in System32 directory
                                              • Modifies Internet Explorer settings
                                              • Modifies registry class
                                              • Suspicious use of SetWindowsHookEx
                                              • System policy modification
                                              PID:3384
                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2164
                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:4596
                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2328
                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:4304
                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Drops file in System32 directory
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1508
                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3628
                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:876
                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3128
                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Drops file in System32 directory
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1100
                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:4392
                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Drops file in System32 directory
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1472
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                                                5⤵
                                                • Suspicious use of FindShellTrayWindow
                                                PID:4260
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                                                5⤵
                                                  PID:3064
                                                • C:\Windows\SysWOW64\rundll32.exe
                                                  rundll32.exe taskkill /f /im wscript.exe
                                                  5⤵
                                                    PID:2544
                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                    rundll32.exe taskkill /f /im sys.exe
                                                    5⤵
                                                      PID:1956
                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                      rundll32.exe taskkill /f /im tati.exe
                                                      5⤵
                                                        PID:1944
                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                        rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                                        5⤵
                                                          PID:3928
                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                          rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                                                          5⤵
                                                            PID:4588
                                                          • C:\Windows\SysWOW64\ping.exe
                                                            ping www.rasasayang.com.my -n 65500 -l 1210
                                                            5⤵
                                                            • Runs ping.exe
                                                            PID:3068
                                                          • C:\Windows\SysWOW64\ping.exe
                                                            ping www.data0.net -n 65500 -l 1340
                                                            5⤵
                                                            • Runs ping.exe
                                                            PID:4448
                                                          • C:\Windows\SysWOW64\ping.exe
                                                            ping www.duniasex.com -n 65500 -l 1340
                                                            5⤵
                                                            • Runs ping.exe
                                                            PID:2112
                                                      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Drops file in System32 directory
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:3648
                                                      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:4928
                                                        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                          4⤵
                                                          • Modifies WinLogon for persistence
                                                          • Modifies system executable filetype association
                                                          • Modifies visibility of file extensions in Explorer
                                                          • Modifies visiblity of hidden/system files in Explorer
                                                          • UAC bypass
                                                          • Disables RegEdit via registry modification
                                                          • Executes dropped EXE
                                                          • Sets file execution options in registry
                                                          • Loads dropped DLL
                                                          • Adds Run key to start application
                                                          • Checks whether UAC is enabled
                                                          • Drops file in System32 directory
                                                          • Modifies Internet Explorer settings
                                                          • Modifies registry class
                                                          • Suspicious use of SetWindowsHookEx
                                                          • System policy modification
                                                          PID:1840
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                                                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1496
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                                                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:4908
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Drops file in System32 directory
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1128
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:216
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:3108
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2544
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Drops file in System32 directory
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:4380
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:4268
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:3832
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2392
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:3508
                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                            rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                                                            5⤵
                                                            • Suspicious use of FindShellTrayWindow
                                                            PID:2212
                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                            rundll32.exe taskkill /f /im sys.exe
                                                            5⤵
                                                              PID:4412
                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                              rundll32.exe taskkill /f /im wscript.exe
                                                              5⤵
                                                                PID:1932
                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                rundll32.exe taskkill /f /im tati.exe
                                                                5⤵
                                                                  PID:2560
                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                  rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                                                  5⤵
                                                                    PID:4240
                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                    rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                                                                    5⤵
                                                                      PID:4812
                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                      rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                                                                      5⤵
                                                                        PID:4648
                                                                      • C:\Windows\SysWOW64\ping.exe
                                                                        ping www.rasasayang.com.my -n 65500 -l 1210
                                                                        5⤵
                                                                        • Runs ping.exe
                                                                        PID:4316
                                                                      • C:\Windows\SysWOW64\ping.exe
                                                                        ping www.data0.net -n 65500 -l 1340
                                                                        5⤵
                                                                        • Runs ping.exe
                                                                        PID:3940
                                                                      • C:\Windows\SysWOW64\ping.exe
                                                                        ping www.duniasex.com -n 65500 -l 1340
                                                                        5⤵
                                                                        • Runs ping.exe
                                                                        PID:2784
                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                    rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                                                                    3⤵
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    PID:4592
                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                    rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                                                                    3⤵
                                                                      PID:4076
                                                                    • C:\Windows\SysWOW64\ping.exe
                                                                      ping www.rasasayang.com.my -n 65500 -l 1210
                                                                      3⤵
                                                                      • Runs ping.exe
                                                                      PID:4472
                                                                    • C:\Windows\SysWOW64\ping.exe
                                                                      ping www.data0.net -n 65500 -l 1340
                                                                      3⤵
                                                                      • Runs ping.exe
                                                                      PID:4992
                                                                    • C:\Windows\SysWOW64\ping.exe
                                                                      ping www.duniasex.com -n 65500 -l 1340
                                                                      3⤵
                                                                      • Runs ping.exe
                                                                      PID:1928
                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                      rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                                                                      3⤵
                                                                        PID:3472
                                                                      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                                        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        PID:4416
                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                        rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                                                        3⤵
                                                                          PID:4564
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          rundll32.exe taskkill /f /im tati.exe
                                                                          3⤵
                                                                            PID:3744
                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                            rundll32.exe taskkill /f /im wscript.exe
                                                                            3⤵
                                                                              PID:3180
                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                              rundll32.exe taskkill /f /im sys.exe
                                                                              3⤵
                                                                                PID:3924
                                                                            • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\csnv.exe
                                                                              "c:\Documents and Settings\Admin\Application Data\Microsoft\csnv.exe" 5c66b25b3e70174800ceb29c00733450ec54eac08a5cc2b0e66c4847b97b0e87
                                                                              2⤵
                                                                              • Modifies system executable filetype association
                                                                              • Modifies visibility of file extensions in Explorer
                                                                              • Modifies visiblity of hidden/system files in Explorer
                                                                              • Executes dropped EXE
                                                                              • Adds Run key to start application
                                                                              • Enumerates connected drives
                                                                              • Drops file in System32 directory
                                                                              • Drops file in Program Files directory
                                                                              • Modifies registry class
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:4692
                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                                            C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                                            1⤵
                                                                            • Loads dropped DLL
                                                                            PID:1496

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v6

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Users\Admin\AppData\Local\Temp\5c66b25b3e70174800ceb29c00733450ec54eac08a5cc2b0e66c4847b97b0e87.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Users\Admin\AppData\Local\Temp\5c66b25b3e70174800ceb29c00733450ec54eac08a5cc2b0e66c4847b97b0e87.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\csnv.exe

                                                                            Filesize

                                                                            76KB

                                                                            MD5

                                                                            74a0cdc2cb516281e8c5011293f30e32

                                                                            SHA1

                                                                            8c1ed010b5f614d3129319d2560341fd65ce65d3

                                                                            SHA256

                                                                            637779fab546f07a2d982763976ebef9e98b586cdd69daa3f0191acddebe4f14

                                                                            SHA512

                                                                            dcfb97f716c2078277fc2fa4c0215fcc00933f2fc190525393f287ee7a46f917a4f79a831c69c6916b939d073f10841fbd4710ef9e6673bd92ccc76e713c5f8a

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\nuxa.exe

                                                                            Filesize

                                                                            76KB

                                                                            MD5

                                                                            4c9a8c3f52f12d0fbff44100049b3928

                                                                            SHA1

                                                                            8169f552e7dfbef23eca55d94a6e9da91e0c4ace

                                                                            SHA256

                                                                            716d97792f4e56bda747571da3a9333197fd91c65a571e17c30597318abde828

                                                                            SHA512

                                                                            e73ee82bbb54065e4222647c418c4c346c4265650fcd11928e57d4cb445026cb7e8d309463142d4f985a3ae55c01cd8a64e5352592659bb78c0bfe96f600418d

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\MSVBVM60.DLL

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                            Filesize

                                                                            1.4MB

                                                                            MD5

                                                                            25f62c02619174b35851b0e0455b3d94

                                                                            SHA1

                                                                            4e8ee85157f1769f6e3f61c0acbe59072209da71

                                                                            SHA256

                                                                            898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

                                                                            SHA512

                                                                            f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 

                                                                            Filesize

                                                                            129KB

                                                                            MD5

                                                                            e2c33f1d5b2c10d0fff92ec379577f06

                                                                            SHA1

                                                                            db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                            SHA256

                                                                            6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                            SHA512

                                                                            6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            1ab7a248463e9dc273c700e848fadb34

                                                                            SHA1

                                                                            6eb0c900d0a43e3f2e80376587cfea8890af5002

                                                                            SHA256

                                                                            eede15dfd308e9bc36b7cbdfc0517c8d473eb4b0922a3a1e0d4e493fc8a35907

                                                                            SHA512

                                                                            5067355aca5350794c19c70c4f2cabeef981206e9bb38cbcb4307c2307ce01810c67277d0ebeaaa2a3de4fd6252483af97108b7985230625696582eb51b15924

                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~

                                                                            Filesize

                                                                            205KB

                                                                            MD5

                                                                            13c6c5413ee9507bc2235b410f8a29c7

                                                                            SHA1

                                                                            d51c42e1c2f9d1f2b2623026bd29419258999cec

                                                                            SHA256

                                                                            019f817c1e197099d55dac98fc80888c52bc0c868d826c80942a44ee6e9bd66d

                                                                            SHA512

                                                                            83a6de02945662746c5c6584994727b9ea4c15a15e4ec72a707f1299c43433bfb6168506debe35e40cc45f6019d2f8a26d9fb5791440120565a1f227cf49bdb1

                                                                          • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\csnv.exe

                                                                            Filesize

                                                                            76KB

                                                                            MD5

                                                                            74a0cdc2cb516281e8c5011293f30e32

                                                                            SHA1

                                                                            8c1ed010b5f614d3129319d2560341fd65ce65d3

                                                                            SHA256

                                                                            637779fab546f07a2d982763976ebef9e98b586cdd69daa3f0191acddebe4f14

                                                                            SHA512

                                                                            dcfb97f716c2078277fc2fa4c0215fcc00933f2fc190525393f287ee7a46f917a4f79a831c69c6916b939d073f10841fbd4710ef9e6673bd92ccc76e713c5f8a

                                                                          • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\nuxa.exe

                                                                            Filesize

                                                                            76KB

                                                                            MD5

                                                                            4c9a8c3f52f12d0fbff44100049b3928

                                                                            SHA1

                                                                            8169f552e7dfbef23eca55d94a6e9da91e0c4ace

                                                                            SHA256

                                                                            716d97792f4e56bda747571da3a9333197fd91c65a571e17c30597318abde828

                                                                            SHA512

                                                                            e73ee82bbb54065e4222647c418c4c346c4265650fcd11928e57d4cb445026cb7e8d309463142d4f985a3ae55c01cd8a64e5352592659bb78c0bfe96f600418d

                                                                          • \??\c:\windows\SysWOW64\Windows 3D.scr

                                                                            Filesize

                                                                            76KB

                                                                            MD5

                                                                            0d9d84b19e7c06d44a6fc284b30c8bc5

                                                                            SHA1

                                                                            bf6ea0233a8762617b55b51a6d8a276699cb16f3

                                                                            SHA256

                                                                            151de147c820c96e45d121551fe08778b700f1b6887c3ac4eaa5ec996b15a90b

                                                                            SHA512

                                                                            00a5c22aca657ea77d98d01935792eec68cb9d07efc6a382b033d5f3a862bca84bd695707b4a013c5196e49b05a0ad6433c9bd2ea69551554a8cb465e76a79b5

                                                                          • \??\c:\windows\SysWOW64\Windows 3D.scr

                                                                            Filesize

                                                                            76KB

                                                                            MD5

                                                                            4c9a8c3f52f12d0fbff44100049b3928

                                                                            SHA1

                                                                            8169f552e7dfbef23eca55d94a6e9da91e0c4ace

                                                                            SHA256

                                                                            716d97792f4e56bda747571da3a9333197fd91c65a571e17c30597318abde828

                                                                            SHA512

                                                                            e73ee82bbb54065e4222647c418c4c346c4265650fcd11928e57d4cb445026cb7e8d309463142d4f985a3ae55c01cd8a64e5352592659bb78c0bfe96f600418d

                                                                          • \??\c:\windows\SysWOW64\Windows 3D.scr

                                                                            Filesize

                                                                            76KB

                                                                            MD5

                                                                            d4328911b4b081bdd7d624c765295384

                                                                            SHA1

                                                                            04f1b55825558857a7a49de9cf908e93f728d4d4

                                                                            SHA256

                                                                            77cfee9c070e0a31df1c72553ca3934b6a2a9953082979b79fc57e4129d3c13b

                                                                            SHA512

                                                                            45ed70070c2ec03415f9595a7fb56bd5067cd32e2f674cc8804acbf3120a5d626129be6b9fe09d172109c7bbb2c5af1dc2d988b368c382077ffe6e79269337fc

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                            Filesize

                                                                            8B

                                                                            MD5

                                                                            24865ca220aa1936cbac0a57685217c5

                                                                            SHA1

                                                                            37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                            SHA256

                                                                            841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                            SHA512

                                                                            c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                          • memory/216-350-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/216-338-0x0000000000000000-mapping.dmp

                                                                          • memory/456-240-0x0000000000000000-mapping.dmp

                                                                          • memory/464-166-0x0000000000000000-mapping.dmp

                                                                          • memory/752-335-0x0000000000000000-mapping.dmp

                                                                          • memory/876-367-0x0000000000000000-mapping.dmp

                                                                          • memory/1100-391-0x0000000000000000-mapping.dmp

                                                                          • memory/1128-331-0x0000000000000000-mapping.dmp

                                                                          • memory/1324-339-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/1324-324-0x0000000000000000-mapping.dmp

                                                                          • memory/1364-195-0x0000000000000000-mapping.dmp

                                                                          • memory/1364-238-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/1364-427-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/1364-201-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/1472-409-0x0000000000000000-mapping.dmp

                                                                          • memory/1496-307-0x0000000000000000-mapping.dmp

                                                                          • memory/1496-423-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/1504-290-0x0000000000000000-mapping.dmp

                                                                          • memory/1508-344-0x0000000000000000-mapping.dmp

                                                                          • memory/1520-365-0x0000000000000000-mapping.dmp

                                                                          • memory/1616-262-0x0000000000000000-mapping.dmp

                                                                          • memory/1812-317-0x0000000000000000-mapping.dmp

                                                                          • memory/1840-286-0x0000000000000000-mapping.dmp

                                                                          • memory/1840-313-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/1840-428-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/1932-178-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/1932-173-0x0000000000000000-mapping.dmp

                                                                          • memory/2152-430-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/2152-139-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/2152-134-0x0000000000000000-mapping.dmp

                                                                          • memory/2164-289-0x0000000000000000-mapping.dmp

                                                                          • memory/2328-311-0x0000000000000000-mapping.dmp

                                                                          • memory/2336-384-0x0000000000000000-mapping.dmp

                                                                          • memory/2392-393-0x0000000000000000-mapping.dmp

                                                                          • memory/2392-402-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/2520-214-0x0000000000000000-mapping.dmp

                                                                          • memory/2544-357-0x0000000000000000-mapping.dmp

                                                                          • memory/2544-363-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/2712-237-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/2712-255-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/2712-416-0x0000000000000000-mapping.dmp

                                                                          • memory/2712-232-0x0000000000000000-mapping.dmp

                                                                          • memory/2908-292-0x0000000000000000-mapping.dmp

                                                                          • memory/3012-189-0x0000000000000000-mapping.dmp

                                                                          • memory/3108-351-0x0000000000000000-mapping.dmp

                                                                          • memory/3128-387-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3128-378-0x0000000000000000-mapping.dmp

                                                                          • memory/3140-356-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3140-364-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3140-349-0x0000000000000000-mapping.dmp

                                                                          • memory/3148-284-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3148-276-0x0000000000000000-mapping.dmp

                                                                          • memory/3148-429-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3332-239-0x0000000000000000-mapping.dmp

                                                                          • memory/3384-426-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3384-264-0x0000000000000000-mapping.dmp

                                                                          • memory/3384-270-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3388-225-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3388-220-0x0000000000000000-mapping.dmp

                                                                          • memory/3388-254-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3428-406-0x0000000000000000-mapping.dmp

                                                                          • memory/3444-312-0x0000000000000000-mapping.dmp

                                                                          • memory/3508-407-0x0000000000000000-mapping.dmp

                                                                          • memory/3616-147-0x0000000000000000-mapping.dmp

                                                                          • memory/3628-352-0x0000000000000000-mapping.dmp

                                                                          • memory/3648-260-0x0000000000000000-mapping.dmp

                                                                          • memory/3832-386-0x0000000000000000-mapping.dmp

                                                                          • memory/3840-171-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3840-155-0x0000000000000000-mapping.dmp

                                                                          • memory/3840-431-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/3880-243-0x0000000000000000-mapping.dmp

                                                                          • memory/3996-342-0x0000000000000000-mapping.dmp

                                                                          • memory/4180-394-0x0000000000000000-mapping.dmp

                                                                          • memory/4180-408-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4188-261-0x0000000000000000-mapping.dmp

                                                                          • memory/4268-383-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4268-374-0x0000000000000000-mapping.dmp

                                                                          • memory/4304-327-0x0000000000000000-mapping.dmp

                                                                          • memory/4304-341-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4336-301-0x0000000000000000-mapping.dmp

                                                                          • memory/4336-432-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4336-315-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4380-366-0x0000000000000000-mapping.dmp

                                                                          • memory/4392-405-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4392-400-0x0000000000000000-mapping.dmp

                                                                          • memory/4404-202-0x0000000000000000-mapping.dmp

                                                                          • memory/4444-226-0x0000000000000000-mapping.dmp

                                                                          • memory/4588-285-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4588-287-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4588-279-0x0000000000000000-mapping.dmp

                                                                          • memory/4596-298-0x0000000000000000-mapping.dmp

                                                                          • memory/4596-309-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4604-373-0x0000000000000000-mapping.dmp

                                                                          • memory/4604-385-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4692-140-0x0000000000000000-mapping.dmp

                                                                          • memory/4772-300-0x0000000000000000-mapping.dmp

                                                                          • memory/4772-308-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4908-318-0x0000000000000000-mapping.dmp

                                                                          • memory/4908-330-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4928-273-0x0000000000000000-mapping.dmp

                                                                          • memory/4976-213-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                            Filesize

                                                                            168KB

                                                                          • memory/4976-208-0x0000000000000000-mapping.dmp

                                                                          • memory/5040-180-0x0000000000000000-mapping.dmp