Analysis

  • max time kernel
    267s
  • max time network
    353s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 23:46

General

  • Target

    0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a.exe

  • Size

    205KB

  • MD5

    6eae993ff5f359c8796199027c009b58

  • SHA1

    f346b43723d8bcad06fc93b203f3663aff1df039

  • SHA256

    0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a

  • SHA512

    3c07b2baa988c6d095af1a158bb04381b941f16db8b470ddb01fe3600857dfb10d3e143716215f1c18f21841b356c3ca931e563c2eca07f885d37b08af09c7c9

  • SSDEEP

    3072:hqhMPssRhlARSOsdwD/98out3SDADeak7dJHB/AKG:hqhMPssRARoiSoS3SsQLH5AK

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Modifies system executable filetype association 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 10 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 10 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 64 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Adds Run key to start application 2 TTPs 42 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 64 IoCs
  • Runs ping.exe 1 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a.exe
    "C:\Users\Admin\AppData\Local\Temp\0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a.exe"
    1⤵
    • Modifies system executable filetype association
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Users\Admin\AppData\Local\Temp\0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a.exe 
      C:\Users\Admin\AppData\Local\Temp\0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a.exe 
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Sets file execution options in registry
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1480
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:996
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
          4⤵
          • Modifies WinLogon for persistence
          • Modifies system executable filetype association
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Sets file execution options in registry
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:1872
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
            5⤵
            • Modifies system executable filetype association
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            • Drops file in System32 directory
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1456
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1248
            • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\scna.exe
              "c:\Documents and Settings\Admin\Application Data\Microsoft\scna.exe" csrss
              6⤵
              • Modifies system executable filetype association
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • Executes dropped EXE
              • Adds Run key to start application
              • Enumerates connected drives
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              PID:1332
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1952
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
              6⤵
              • Modifies WinLogon for persistence
              • Modifies system executable filetype association
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Sets file execution options in registry
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops file in System32 directory
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:1876
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:948
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:1772
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1196
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:1580
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                PID:924
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                  8⤵
                  • Modifies WinLogon for persistence
                  • Modifies system executable filetype association
                  • Modifies visibility of file extensions in Explorer
                  • Modifies visiblity of hidden/system files in Explorer
                  • UAC bypass
                  • Disables RegEdit via registry modification
                  • Executes dropped EXE
                  • Sets file execution options in registry
                  • Loads dropped DLL
                  • Adds Run key to start application
                  • Checks whether UAC is enabled
                  • Drops file in System32 directory
                  • Modifies Internet Explorer settings
                  • Modifies registry class
                  • Suspicious use of SetWindowsHookEx
                  • System policy modification
                  PID:1508
                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of SetWindowsHookEx
                    PID:1204
                    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                      C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1532
                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of SetWindowsHookEx
                    PID:1788
                    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                      C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1964
                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1772
                    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                      C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1924
                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:876
                    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                      C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1604
                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of SetWindowsHookEx
                    PID:1428
                    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                      C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1308
                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of SetWindowsHookEx
                    PID:1532
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                    9⤵
                    • Suspicious use of FindShellTrayWindow
                    PID:1636
                  • C:\Windows\SysWOW64\ping.exe
                    ping www.duniasex.com -n 65500 -l 1340
                    9⤵
                    • Runs ping.exe
                    PID:2120
                  • C:\Windows\SysWOW64\ping.exe
                    ping www.data0.net -n 65500 -l 1340
                    9⤵
                    • Runs ping.exe
                    PID:2132
                  • C:\Windows\SysWOW64\rundll32.exe
                    rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                    9⤵
                      PID:2156
                    • C:\Windows\SysWOW64\ping.exe
                      ping www.rasasayang.com.my -n 65500 -l 1210
                      9⤵
                      • Runs ping.exe
                      PID:2148
                    • C:\Windows\SysWOW64\rundll32.exe
                      rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                      9⤵
                        PID:2196
                      • C:\Windows\SysWOW64\rundll32.exe
                        rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                        9⤵
                          PID:2216
                        • C:\Windows\SysWOW64\rundll32.exe
                          rundll32.exe taskkill /f /im tati.exe
                          9⤵
                            PID:2244
                          • C:\Windows\SysWOW64\rundll32.exe
                            rundll32.exe taskkill /f /im wscript.exe
                            9⤵
                              PID:2256
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe taskkill /f /im sys.exe
                              9⤵
                                PID:2268
                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Drops file in System32 directory
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of SetWindowsHookEx
                            PID:1612
                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                              8⤵
                              • Modifies WinLogon for persistence
                              • Modifies system executable filetype association
                              • Modifies visibility of file extensions in Explorer
                              • Modifies visiblity of hidden/system files in Explorer
                              • UAC bypass
                              • Disables RegEdit via registry modification
                              • Executes dropped EXE
                              • Sets file execution options in registry
                              • Adds Run key to start application
                              • Checks whether UAC is enabled
                              • Drops file in System32 directory
                              • Modifies Internet Explorer settings
                              • Modifies registry class
                              • Suspicious use of SetWindowsHookEx
                              • System policy modification
                              PID:1816
                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                                9⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of SetWindowsHookEx
                                PID:2032
                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                                  10⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1652
                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                9⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1580
                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                  10⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1744
                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                9⤵
                                • Executes dropped EXE
                                • Drops file in System32 directory
                                • Suspicious use of SetWindowsHookEx
                                PID:1488
                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                  10⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:620
                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                                9⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:324
                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                  10⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2020
                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                9⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1728
                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                  10⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2100
                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                9⤵
                                  PID:2324
                                • C:\Windows\SysWOW64\rundll32.exe
                                  rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                                  9⤵
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2424
                                • C:\Windows\SysWOW64\ping.exe
                                  ping www.data0.net -n 65500 -l 1340
                                  9⤵
                                  • Runs ping.exe
                                  PID:2512
                                • C:\Windows\SysWOW64\rundll32.exe
                                  rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                                  9⤵
                                    PID:2528
                                  • C:\Windows\SysWOW64\ping.exe
                                    ping www.rasasayang.com.my -n 65500 -l 1210
                                    9⤵
                                    • Runs ping.exe
                                    PID:2520
                                  • C:\Windows\SysWOW64\ping.exe
                                    ping www.duniasex.com -n 65500 -l 1340
                                    9⤵
                                    • Runs ping.exe
                                    PID:2504
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                                    9⤵
                                      PID:2596
                                    • C:\Windows\SysWOW64\rundll32.exe
                                      rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                      9⤵
                                        PID:2612
                                      • C:\Windows\SysWOW64\rundll32.exe
                                        rundll32.exe taskkill /f /im tati.exe
                                        9⤵
                                          PID:2636
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe taskkill /f /im wscript.exe
                                          9⤵
                                            PID:2656
                                          • C:\Windows\SysWOW64\rundll32.exe
                                            rundll32.exe taskkill /f /im sys.exe
                                            9⤵
                                              PID:2668
                                        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1056
                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                            C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                            8⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1068
                                        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1692
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                                          7⤵
                                          • Suspicious use of FindShellTrayWindow
                                          PID:1160
                                        • C:\Windows\SysWOW64\ping.exe
                                          ping www.duniasex.com -n 65500 -l 1340
                                          7⤵
                                          • Runs ping.exe
                                          PID:1228
                                        • C:\Windows\SysWOW64\ping.exe
                                          ping www.data0.net -n 65500 -l 1340
                                          7⤵
                                          • Runs ping.exe
                                          PID:1588
                                        • C:\Windows\SysWOW64\ping.exe
                                          ping www.rasasayang.com.my -n 65500 -l 1210
                                          7⤵
                                          • Runs ping.exe
                                          PID:1552
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                                          7⤵
                                            PID:1972
                                          • C:\Windows\SysWOW64\rundll32.exe
                                            rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                                            7⤵
                                              PID:1792
                                            • C:\Windows\SysWOW64\rundll32.exe
                                              rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                              7⤵
                                                PID:1056
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                rundll32.exe taskkill /f /im tati.exe
                                                7⤵
                                                  PID:2020
                                                • C:\Windows\SysWOW64\rundll32.exe
                                                  rundll32.exe taskkill /f /im wscript.exe
                                                  7⤵
                                                    PID:920
                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                    rundll32.exe taskkill /f /im sys.exe
                                                    7⤵
                                                      PID:1636
                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                  C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Drops file in System32 directory
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1504
                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                    C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1972
                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                  C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  PID:880
                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                  C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2000
                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                    C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1136
                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                  C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1584
                                                • C:\Windows\SysWOW64\rundll32.exe
                                                  rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                                                  5⤵
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:552
                                                • C:\Windows\SysWOW64\ping.exe
                                                  ping www.duniasex.com -n 65500 -l 1340
                                                  5⤵
                                                  • Runs ping.exe
                                                  PID:368
                                                • C:\Windows\SysWOW64\ping.exe
                                                  ping www.data0.net -n 65500 -l 1340
                                                  5⤵
                                                  • Runs ping.exe
                                                  PID:1260
                                                • C:\Windows\SysWOW64\ping.exe
                                                  ping www.rasasayang.com.my -n 65500 -l 1210
                                                  5⤵
                                                  • Runs ping.exe
                                                  PID:1788
                                                • C:\Windows\SysWOW64\rundll32.exe
                                                  rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                                                  5⤵
                                                    PID:612
                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                    rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                                                    5⤵
                                                      PID:1044
                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                      rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                                      5⤵
                                                        PID:1760
                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                        rundll32.exe taskkill /f /im tati.exe
                                                        5⤵
                                                          PID:1696
                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                          rundll32.exe taskkill /f /im wscript.exe
                                                          5⤵
                                                            PID:1700
                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                            rundll32.exe taskkill /f /im sys.exe
                                                            5⤵
                                                              PID:1688
                                                        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                                          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:1548
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                                            C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1304
                                                        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Drops file in System32 directory
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1600
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                            C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1560
                                                        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1984
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                                            C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:944
                                                        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Drops file in System32 directory
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1784
                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                            C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                            4⤵
                                                            • Modifies WinLogon for persistence
                                                            • Modifies system executable filetype association
                                                            • Modifies visibility of file extensions in Explorer
                                                            • Modifies visiblity of hidden/system files in Explorer
                                                            • UAC bypass
                                                            • Disables RegEdit via registry modification
                                                            • Executes dropped EXE
                                                            • Sets file execution options in registry
                                                            • Adds Run key to start application
                                                            • Checks whether UAC is enabled
                                                            • Drops file in System32 directory
                                                            • Modifies Internet Explorer settings
                                                            • Modifies registry class
                                                            • Suspicious use of SetWindowsHookEx
                                                            • System policy modification
                                                            PID:1348
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                                                              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\csrss.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Drops file in System32 directory
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:736
                                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                                                                C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1728
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                                              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\smss.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1284
                                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                                                C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1108
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\lsass.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1496
                                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                                C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe 
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:320
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\services.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:612
                                                              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                                                C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe 
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2092
                                                            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\winlogon.exe
                                                              5⤵
                                                                PID:2348
                                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe 
                                                                  6⤵
                                                                    PID:2452
                                                                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                                  C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                                  5⤵
                                                                    PID:2720
                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                    rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                                                                    5⤵
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    PID:2740
                                                                  • C:\Windows\SysWOW64\ping.exe
                                                                    ping www.duniasex.com -n 65500 -l 1340
                                                                    5⤵
                                                                    • Runs ping.exe
                                                                    PID:2784
                                                                  • C:\Windows\SysWOW64\ping.exe
                                                                    ping www.data0.net -n 65500 -l 1340
                                                                    5⤵
                                                                    • Runs ping.exe
                                                                    PID:2792
                                                                  • C:\Windows\SysWOW64\ping.exe
                                                                    ping www.rasasayang.com.my -n 65500 -l 1210
                                                                    5⤵
                                                                    • Runs ping.exe
                                                                    PID:2800
                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                    rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                                                                    5⤵
                                                                      PID:2816
                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                      rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                                                                      5⤵
                                                                        PID:2852
                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                        rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                                                        5⤵
                                                                          PID:2888
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          rundll32.exe taskkill /f /im tati.exe
                                                                          5⤵
                                                                            PID:2904
                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                            rundll32.exe taskkill /f /im wscript.exe
                                                                            5⤵
                                                                              PID:2920
                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                              rundll32.exe taskkill /f /im sys.exe
                                                                              5⤵
                                                                                PID:2940
                                                                          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                                            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • Drops file in System32 directory
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1240
                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                            rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                                                                            3⤵
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            PID:536
                                                                          • C:\Windows\SysWOW64\ping.exe
                                                                            ping www.duniasex.com -n 65500 -l 1340
                                                                            3⤵
                                                                            • Runs ping.exe
                                                                            PID:752
                                                                          • C:\Windows\SysWOW64\ping.exe
                                                                            ping www.data0.net -n 65500 -l 1340
                                                                            3⤵
                                                                            • Runs ping.exe
                                                                            PID:1248
                                                                          • C:\Windows\SysWOW64\ping.exe
                                                                            ping www.rasasayang.com.my -n 65500 -l 1210
                                                                            3⤵
                                                                            • Runs ping.exe
                                                                            PID:1656
                                                                          • C:\Windows\SysWOW64\rundll32.exe
                                                                            rundll32.exe taskkill /f /im PCMAV-CLN.exe /im PCMAV-RTP.exe
                                                                            3⤵
                                                                              PID:2012
                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                              rundll32.exe taskkill /f /im Ansav.exe /im ansavgd.exe
                                                                              3⤵
                                                                                PID:1700
                                                                              • C:\Windows\SysWOW64\rundll32.exe
                                                                                rundll32.exe taskkill /f /im kspoold.exe /im kspool.exe
                                                                                3⤵
                                                                                  PID:1488
                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                  rundll32.exe taskkill /f /im tati.exe
                                                                                  3⤵
                                                                                    PID:852
                                                                                  • C:\Windows\SysWOW64\rundll32.exe
                                                                                    rundll32.exe taskkill /f /im wscript.exe
                                                                                    3⤵
                                                                                      PID:1768
                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                      rundll32.exe taskkill /f /im sys.exe
                                                                                      3⤵
                                                                                        PID:1096
                                                                                    • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\wdsa.exe
                                                                                      "c:\Documents and Settings\Admin\Application Data\Microsoft\wdsa.exe" 0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a
                                                                                      2⤵
                                                                                      • Modifies system executable filetype association
                                                                                      • Modifies visibility of file extensions in Explorer
                                                                                      • Modifies visiblity of hidden/system files in Explorer
                                                                                      • Executes dropped EXE
                                                                                      • Adds Run key to start application
                                                                                      • Enumerates connected drives
                                                                                      • Drops file in System32 directory
                                                                                      • Drops file in Program Files directory
                                                                                      • Modifies registry class
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:788

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v6

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Users\Admin\AppData\Local\Temp\0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\scna.exe

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    4c080dbb57d2129d29f7cd09e28d8cd6

                                                                                    SHA1

                                                                                    b27fb211f319c0c7d391e4c746b0501434d57a14

                                                                                    SHA256

                                                                                    0720d356c5ec5c5fbda25cdd6837fa4a7492576fa60f9104a5b1e70911a616bc

                                                                                    SHA512

                                                                                    043d89cc861d22fbd9463713928597f3a33d8b43ec146939801b22f5dd12b2c456db6d1f76d18deb87a30985bf43c3376eb3c6c7439c53747547ce6f34062c57

                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\wdsa.exe

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    bd9ad661e0bc9238471aa0ff5f98bba6

                                                                                    SHA1

                                                                                    432ed48c09e06bd86386dccea88414df53c68b33

                                                                                    SHA256

                                                                                    42c71e4f10bef48e59667cb0669d2e7dd09931fbb7f59caf1e26449b2791fcda

                                                                                    SHA512

                                                                                    37a1ff58849bdca5d5367f034788b809068b4b8d731bdfff6b2185a462e9297d68623a92c1b4747b5e18a4c0598a200a8b88abc1b7997cc0bac1b16d38fce622

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\MSVBVM60.DLL

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\lsass.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\services.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\winlogon.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\~Paraysutki_VM_Community~

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\scna.exe

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    4c080dbb57d2129d29f7cd09e28d8cd6

                                                                                    SHA1

                                                                                    b27fb211f319c0c7d391e4c746b0501434d57a14

                                                                                    SHA256

                                                                                    0720d356c5ec5c5fbda25cdd6837fa4a7492576fa60f9104a5b1e70911a616bc

                                                                                    SHA512

                                                                                    043d89cc861d22fbd9463713928597f3a33d8b43ec146939801b22f5dd12b2c456db6d1f76d18deb87a30985bf43c3376eb3c6c7439c53747547ce6f34062c57

                                                                                  • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\wdsa.exe

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    bd9ad661e0bc9238471aa0ff5f98bba6

                                                                                    SHA1

                                                                                    432ed48c09e06bd86386dccea88414df53c68b33

                                                                                    SHA256

                                                                                    42c71e4f10bef48e59667cb0669d2e7dd09931fbb7f59caf1e26449b2791fcda

                                                                                    SHA512

                                                                                    37a1ff58849bdca5d5367f034788b809068b4b8d731bdfff6b2185a462e9297d68623a92c1b4747b5e18a4c0598a200a8b88abc1b7997cc0bac1b16d38fce622

                                                                                  • \??\c:\windows\SysWOW64\CommandPrompt.Sysm

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    fefc88fc60916a4587fd5ed1599ada70

                                                                                    SHA1

                                                                                    58590badc9c93d3ff20d0da14120bda2d3387bd0

                                                                                    SHA256

                                                                                    c20faaec556b0564a644f3c62336fcf363f674aa9bb2265b984be350a7368f9c

                                                                                    SHA512

                                                                                    f3a284d60cf99782db1c67bc6d1070b617f103412a4ead99fa5953e99d336c80f4f7c1b9c941929cb5ef5570d0f8026b1c7b31ec6d0784b46caf752ce6f0dd79

                                                                                  • \??\c:\windows\SysWOW64\Desktop.sysm

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    fefc88fc60916a4587fd5ed1599ada70

                                                                                    SHA1

                                                                                    58590badc9c93d3ff20d0da14120bda2d3387bd0

                                                                                    SHA256

                                                                                    c20faaec556b0564a644f3c62336fcf363f674aa9bb2265b984be350a7368f9c

                                                                                    SHA512

                                                                                    f3a284d60cf99782db1c67bc6d1070b617f103412a4ead99fa5953e99d336c80f4f7c1b9c941929cb5ef5570d0f8026b1c7b31ec6d0784b46caf752ce6f0dd79

                                                                                  • \??\c:\windows\SysWOW64\Windows 3D.scr

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    4c080dbb57d2129d29f7cd09e28d8cd6

                                                                                    SHA1

                                                                                    b27fb211f319c0c7d391e4c746b0501434d57a14

                                                                                    SHA256

                                                                                    0720d356c5ec5c5fbda25cdd6837fa4a7492576fa60f9104a5b1e70911a616bc

                                                                                    SHA512

                                                                                    043d89cc861d22fbd9463713928597f3a33d8b43ec146939801b22f5dd12b2c456db6d1f76d18deb87a30985bf43c3376eb3c6c7439c53747547ce6f34062c57

                                                                                  • \??\c:\windows\SysWOW64\Windows 3D.scr

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    fefc88fc60916a4587fd5ed1599ada70

                                                                                    SHA1

                                                                                    58590badc9c93d3ff20d0da14120bda2d3387bd0

                                                                                    SHA256

                                                                                    c20faaec556b0564a644f3c62336fcf363f674aa9bb2265b984be350a7368f9c

                                                                                    SHA512

                                                                                    f3a284d60cf99782db1c67bc6d1070b617f103412a4ead99fa5953e99d336c80f4f7c1b9c941929cb5ef5570d0f8026b1c7b31ec6d0784b46caf752ce6f0dd79

                                                                                  • \??\c:\windows\SysWOW64\Windows 3D.scr

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    626ae66dd2d67b3b3f40b7be53cc6782

                                                                                    SHA1

                                                                                    d94f307e2d87a9abc97aa86b112c810bc45d8465

                                                                                    SHA256

                                                                                    ef53e1336f3efc0d25267db7d7d38199f601bcbcc06d4b90a039e5728197b2a6

                                                                                    SHA512

                                                                                    d43dc540007e08e586c23820be8296d3ad8f4e950a26242b0568c27c5deaf57d3bac0fc629d8ab197551ce9dcaf2670cef410ca138a481825e990f1590d1362f

                                                                                  • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                                    Filesize

                                                                                    8B

                                                                                    MD5

                                                                                    24865ca220aa1936cbac0a57685217c5

                                                                                    SHA1

                                                                                    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                                    SHA256

                                                                                    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                                    SHA512

                                                                                    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                                  • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                                    Filesize

                                                                                    8B

                                                                                    MD5

                                                                                    24865ca220aa1936cbac0a57685217c5

                                                                                    SHA1

                                                                                    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                                    SHA256

                                                                                    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                                    SHA512

                                                                                    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                                  • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                                    Filesize

                                                                                    8B

                                                                                    MD5

                                                                                    24865ca220aa1936cbac0a57685217c5

                                                                                    SHA1

                                                                                    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                                    SHA256

                                                                                    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                                    SHA512

                                                                                    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                                  • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                                    Filesize

                                                                                    8B

                                                                                    MD5

                                                                                    24865ca220aa1936cbac0a57685217c5

                                                                                    SHA1

                                                                                    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                                    SHA256

                                                                                    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                                    SHA512

                                                                                    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                                  • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                                    Filesize

                                                                                    8B

                                                                                    MD5

                                                                                    24865ca220aa1936cbac0a57685217c5

                                                                                    SHA1

                                                                                    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                                    SHA256

                                                                                    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                                    SHA512

                                                                                    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                                  • \??\c:\windows\SysWOW64\maxtrox.txt

                                                                                    Filesize

                                                                                    8B

                                                                                    MD5

                                                                                    24865ca220aa1936cbac0a57685217c5

                                                                                    SHA1

                                                                                    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                                                                                    SHA256

                                                                                    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                                                                                    SHA512

                                                                                    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                                                                                  • \Users\Admin\AppData\Local\Temp\0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • \Users\Admin\AppData\Local\Temp\0606b4e4dea64c05a6b041dbc2a50276e02efa9fcd194e2d895c1dec9d3d266a.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • \Users\Admin\AppData\Roaming\Microsoft\scna.exe

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    4c080dbb57d2129d29f7cd09e28d8cd6

                                                                                    SHA1

                                                                                    b27fb211f319c0c7d391e4c746b0501434d57a14

                                                                                    SHA256

                                                                                    0720d356c5ec5c5fbda25cdd6837fa4a7492576fa60f9104a5b1e70911a616bc

                                                                                    SHA512

                                                                                    043d89cc861d22fbd9463713928597f3a33d8b43ec146939801b22f5dd12b2c456db6d1f76d18deb87a30985bf43c3376eb3c6c7439c53747547ce6f34062c57

                                                                                  • \Users\Admin\AppData\Roaming\Microsoft\scna.exe

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    4c080dbb57d2129d29f7cd09e28d8cd6

                                                                                    SHA1

                                                                                    b27fb211f319c0c7d391e4c746b0501434d57a14

                                                                                    SHA256

                                                                                    0720d356c5ec5c5fbda25cdd6837fa4a7492576fa60f9104a5b1e70911a616bc

                                                                                    SHA512

                                                                                    043d89cc861d22fbd9463713928597f3a33d8b43ec146939801b22f5dd12b2c456db6d1f76d18deb87a30985bf43c3376eb3c6c7439c53747547ce6f34062c57

                                                                                  • \Users\Admin\AppData\Roaming\Microsoft\wdsa.exe

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    bd9ad661e0bc9238471aa0ff5f98bba6

                                                                                    SHA1

                                                                                    432ed48c09e06bd86386dccea88414df53c68b33

                                                                                    SHA256

                                                                                    42c71e4f10bef48e59667cb0669d2e7dd09931fbb7f59caf1e26449b2791fcda

                                                                                    SHA512

                                                                                    37a1ff58849bdca5d5367f034788b809068b4b8d731bdfff6b2185a462e9297d68623a92c1b4747b5e18a4c0598a200a8b88abc1b7997cc0bac1b16d38fce622

                                                                                  • \Users\Admin\AppData\Roaming\Microsoft\wdsa.exe

                                                                                    Filesize

                                                                                    76KB

                                                                                    MD5

                                                                                    bd9ad661e0bc9238471aa0ff5f98bba6

                                                                                    SHA1

                                                                                    432ed48c09e06bd86386dccea88414df53c68b33

                                                                                    SHA256

                                                                                    42c71e4f10bef48e59667cb0669d2e7dd09931fbb7f59caf1e26449b2791fcda

                                                                                    SHA512

                                                                                    37a1ff58849bdca5d5367f034788b809068b4b8d731bdfff6b2185a462e9297d68623a92c1b4747b5e18a4c0598a200a8b88abc1b7997cc0bac1b16d38fce622

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\csrss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\msvbvm60.dll

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    5343a19c618bc515ceb1695586c6c137

                                                                                    SHA1

                                                                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                                                                    SHA256

                                                                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                                                                    SHA512

                                                                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe

                                                                                    Filesize

                                                                                    205KB

                                                                                    MD5

                                                                                    eaccba222f2250fdf8a1ffbd65bef273

                                                                                    SHA1

                                                                                    1d6106112a20d5630e005439a599da8143ca3a7d

                                                                                    SHA256

                                                                                    5252967b2005e27fa8935d9438eca423923dceb410a5980d2775df8c361e3dfc

                                                                                    SHA512

                                                                                    43f93398ccc502f55cb17da18f9e9cc19a1920f0b6ab3e2dd1ce5a43db0c46fbb13d3a0e1f9d5438b832e9e72e3b0a16cc366c349fedadfed60114be5942c0d6

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~²\smss.exe 

                                                                                    Filesize

                                                                                    129KB

                                                                                    MD5

                                                                                    e2c33f1d5b2c10d0fff92ec379577f06

                                                                                    SHA1

                                                                                    db52e7c71eb6e99ad6fa38305a7c62337246cc9e

                                                                                    SHA256

                                                                                    6fe9ec72f717f7e26398412b782a725030c796a253d3d17c883a6dbaf1bc4e01

                                                                                    SHA512

                                                                                    6a813184d730de5a8d2295222c4a47a7295e28886c5a982ab9d94a7ceed7f41683038ce9981fa1a789a8371095807fe4b36ae3f3502588624fed94664aa6b1c8

                                                                                  • memory/320-385-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/620-384-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/752-61-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/752-84-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/752-112-0x00000000003B0000-0x00000000003B6000-memory.dmp

                                                                                    Filesize

                                                                                    24KB

                                                                                  • memory/752-59-0x00000000003B0000-0x00000000003DA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/924-202-0x0000000000420000-0x000000000044A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/924-252-0x0000000000420000-0x000000000044A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/924-203-0x0000000000420000-0x000000000044A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/924-253-0x0000000000420000-0x000000000044A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/944-239-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/944-303-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/996-114-0x0000000000390000-0x00000000003BA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/996-113-0x0000000000390000-0x00000000003BA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1056-280-0x0000000000230000-0x000000000025A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1068-311-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1068-281-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1108-368-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1136-314-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1136-301-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1248-123-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1248-117-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1304-191-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1304-214-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1308-373-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1308-383-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1308-346-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1348-282-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1348-371-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1428-344-0x0000000000290000-0x00000000002BA000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1456-116-0x0000000000270000-0x000000000029A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1480-359-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1480-64-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1480-165-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1508-254-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1508-205-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1532-231-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1532-307-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1560-206-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1560-216-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1580-175-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1600-204-0x0000000000320000-0x000000000034A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1600-201-0x0000000000320000-0x000000000034A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1600-250-0x0000000000320000-0x000000000034A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1604-323-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1652-316-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1652-300-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1728-318-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1744-372-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1744-381-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1772-160-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1816-345-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1872-115-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1872-364-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1876-172-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1876-367-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1876-283-0x0000000075531000-0x0000000075533000-memory.dmp

                                                                                    Filesize

                                                                                    8KB

                                                                                  • memory/1924-304-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1952-170-0x0000000000230000-0x000000000025A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1952-168-0x0000000000230000-0x000000000025A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1964-298-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1964-234-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1972-215-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/1972-207-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB

                                                                                  • memory/2020-390-0x0000000000400000-0x000000000042A000-memory.dmp

                                                                                    Filesize

                                                                                    168KB