Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/12/2022, 01:24 UTC

General

  • Target

    4a6deb36dd1500d2cf1dc7a1a562e665a46018c1386a1e4159a6a688f1a5a590.exe

  • Size

    77KB

  • MD5

    0220615191ea4e9d6f4442b57b7be970

  • SHA1

    0ac943ed69468babfd8fe7ff62534763fe835805

  • SHA256

    4a6deb36dd1500d2cf1dc7a1a562e665a46018c1386a1e4159a6a688f1a5a590

  • SHA512

    af7554c39d80779b28e463d89cc89ca04edd141c6d5062c516548e8d3cf24ffe31e632297e98d59c8f685e9ea6d9eb61d5685c939e619084cb5a8bd0a02b4706

  • SSDEEP

    768:QMXkE7U60L5jTgc/iPQc0Ic+a+GlKyHu0y3u02qU6E4/IJe/nbcuyD7UIu:QMUYU6U5jUdPQc+n35KZg8/nouy8Iu

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 7 IoCs
  • Modifies system executable filetype association 2 TTPs 7 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 7 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 7 IoCs
  • UAC bypass 3 TTPs 7 IoCs
  • Disables RegEdit via registry modification 7 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 42 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Loads dropped DLL 42 IoCs
  • Adds Run key to start application 2 TTPs 42 IoCs
  • Checks whether UAC is enabled 1 TTPs 7 IoCs
  • Drops file in System32 directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 14 IoCs
  • Runs ping.exe 1 TTPs 21 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SetWindowsHookEx 43 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a6deb36dd1500d2cf1dc7a1a562e665a46018c1386a1e4159a6a688f1a5a590.exe
    "C:\Users\Admin\AppData\Local\Temp\4a6deb36dd1500d2cf1dc7a1a562e665a46018c1386a1e4159a6a688f1a5a590.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies system executable filetype association
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Sets file execution options in registry
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4816
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
      C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Sets file execution options in registry
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:448
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4992
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies system executable filetype association
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Disables RegEdit via registry modification
        • Executes dropped EXE
        • Sets file execution options in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks whether UAC is enabled
        • Drops file in System32 directory
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:4120
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1128
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:4988
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies system executable filetype association
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Executes dropped EXE
          • Sets file execution options in registry
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:3568
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:4660
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:3404
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1760
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
            5⤵
            • Modifies WinLogon for persistence
            • Modifies system executable filetype association
            • Modifies visibility of file extensions in Explorer
            • Modifies visiblity of hidden/system files in Explorer
            • UAC bypass
            • Disables RegEdit via registry modification
            • Executes dropped EXE
            • Sets file execution options in registry
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks whether UAC is enabled
            • Drops file in System32 directory
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            • System policy modification
            PID:2840
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:308
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:3884
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:3892
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:3936
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
              6⤵
              • Modifies WinLogon for persistence
              • Modifies system executable filetype association
              • Modifies visibility of file extensions in Explorer
              • Modifies visiblity of hidden/system files in Explorer
              • UAC bypass
              • Disables RegEdit via registry modification
              • Executes dropped EXE
              • Sets file execution options in registry
              • Loads dropped DLL
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Drops file in System32 directory
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              • System policy modification
              PID:4548
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:3456
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:3572
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:4516
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:3688
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2220
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2344
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                7⤵
                • Suspicious use of FindShellTrayWindow
                PID:3556
              • C:\Windows\SysWOW64\ping.exe
                ping www.duniasex.com -n 65500 -l 1340
                7⤵
                • Runs ping.exe
                PID:2372
              • C:\Windows\SysWOW64\ping.exe
                ping www.data0.net -n 65500 -l 1340
                7⤵
                • Runs ping.exe
                PID:1828
              • C:\Windows\SysWOW64\ping.exe
                ping www.rasasayang.com.my -n 65500 -l 1340
                7⤵
                • Runs ping.exe
                PID:3052
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:5024
            • C:\Windows\SysWOW64\rundll32.exe
              rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
              6⤵
              • Suspicious use of FindShellTrayWindow
              PID:3620
            • C:\Windows\SysWOW64\ping.exe
              ping www.rasasayang.com.my -n 65500 -l 1340
              6⤵
              • Runs ping.exe
              PID:3668
            • C:\Windows\SysWOW64\ping.exe
              ping www.data0.net -n 65500 -l 1340
              6⤵
              • Runs ping.exe
              PID:2236
            • C:\Windows\SysWOW64\ping.exe
              ping www.duniasex.com -n 65500 -l 1340
              6⤵
              • Runs ping.exe
              PID:4720
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:4316
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:4868
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
            5⤵
            • Suspicious use of FindShellTrayWindow
            PID:1908
          • C:\Windows\SysWOW64\ping.exe
            ping www.duniasex.com -n 65500 -l 1340
            5⤵
            • Runs ping.exe
            PID:4660
          • C:\Windows\SysWOW64\ping.exe
            ping www.data0.net -n 65500 -l 1340
            5⤵
            • Runs ping.exe
            PID:5096
          • C:\Windows\SysWOW64\ping.exe
            ping www.rasasayang.com.my -n 65500 -l 1340
            5⤵
            • Runs ping.exe
            PID:3880
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1952
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1612
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
          C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2796
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
          4⤵
          • Suspicious use of FindShellTrayWindow
          PID:4256
        • C:\Windows\SysWOW64\ping.exe
          ping www.duniasex.com -n 65500 -l 1340
          4⤵
          • Runs ping.exe
          PID:3188
        • C:\Windows\SysWOW64\ping.exe
          ping www.data0.net -n 65500 -l 1340
          4⤵
          • Runs ping.exe
          PID:1912
        • C:\Windows\SysWOW64\ping.exe
          ping www.rasasayang.com.my -n 65500 -l 1340
          4⤵
          • Runs ping.exe
          PID:3680
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1288
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4444
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3172
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
        3⤵
        • Suspicious use of FindShellTrayWindow
        PID:1512
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1964
      • C:\Windows\SysWOW64\ping.exe
        ping www.duniasex.com -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:2808
      • C:\Windows\SysWOW64\ping.exe
        ping www.data0.net -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:2388
      • C:\Windows\SysWOW64\ping.exe
        ping www.rasasayang.com.my -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:3616
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
      C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:884
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
      C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:832
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
      C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:5116
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
      C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2896
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
      C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
      2⤵
      • Modifies WinLogon for persistence
      • Modifies system executable filetype association
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Sets file execution options in registry
      • Loads dropped DLL
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4324
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3584
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4592
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4296
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1456
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
        3⤵
        • Suspicious use of FindShellTrayWindow
        PID:3116
      • C:\Windows\SysWOW64\ping.exe
        ping www.duniasex.com -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:2436
      • C:\Windows\SysWOW64\ping.exe
        ping www.data0.net -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:1272
      • C:\Windows\SysWOW64\ping.exe
        ping www.rasasayang.com.my -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:5108
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
      2⤵
      • Suspicious use of FindShellTrayWindow
      PID:2700
    • C:\Windows\SysWOW64\ping.exe
      ping www.data0.net -n 65500 -l 1340
      2⤵
      • Runs ping.exe
      PID:3584
    • C:\Windows\SysWOW64\ping.exe
      ping www.duniasex.com -n 65500 -l 1340
      2⤵
      • Runs ping.exe
      PID:4864
    • C:\Windows\SysWOW64\ping.exe
      ping www.rasasayang.com.my -n 65500 -l 1340
      2⤵
      • Runs ping.exe
      PID:3588
  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4756
  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:4280

Network

  • flag-unknown
    DNS
    www.duniasex.com
    ping.exe
    Remote address:
    8.8.8.8:53
    Request
    www.duniasex.com
    IN A
    Response
    www.duniasex.com
    IN A
    104.21.233.253
    www.duniasex.com
    IN A
    104.21.233.254
  • flag-unknown
    DNS
    www.data0.net
    ping.exe
    Remote address:
    8.8.8.8:53
    Request
    www.data0.net
    IN A
    Response
    www.data0.net
    IN A
    104.21.11.123
    www.data0.net
    IN A
    172.67.166.6
  • flag-unknown
    DNS
    www.rasasayang.com.my
    ping.exe
    Remote address:
    8.8.8.8:53
    Request
    www.rasasayang.com.my
    IN A
    Response
    www.rasasayang.com.my
    IN CNAME
    rasasayang.com.my
    rasasayang.com.my
    IN A
    128.199.70.193
  • 93.184.221.240:80
    322 B
    7
  • 93.184.221.240:80
    322 B
    7
  • 104.80.225.205:443
    322 B
    7
  • 8.8.8.8:53
    www.duniasex.com
    dns
    ping.exe
    62 B
    94 B
    1
    1

    DNS Request

    www.duniasex.com

    DNS Response

    104.21.233.253
    104.21.233.254

  • 8.8.8.8:53
    www.data0.net
    dns
    ping.exe
    59 B
    91 B
    1
    1

    DNS Request

    www.data0.net

    DNS Response

    104.21.11.123
    172.67.166.6

  • 8.8.8.8:53
    www.rasasayang.com.my
    dns
    ping.exe
    67 B
    97 B
    1
    1

    DNS Request

    www.rasasayang.com.my

    DNS Response

    128.199.70.193

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe

    Filesize

    77KB

    MD5

    08a8651a66024da9cce2b257a94d7a07

    SHA1

    407b18a4f99945af1128702e7c71bf377490ca07

    SHA256

    f6995df3ec9af68606bddb1f8179138f0582224c972b45a3cb8dc4d94bf5d18a

    SHA512

    86a88214518c5be98ffa46037d1ec0182693f56589af7acf55c905397706e2a5d9b09daed40da18bdd7a382643bec23bf32f03f9069df7a4501d9ffdebe5765e

  • memory/308-209-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/448-152-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/448-390-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/832-275-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/884-248-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/884-252-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1128-166-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1456-376-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1612-346-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1760-197-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1952-333-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1952-338-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/1964-336-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2220-317-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2220-302-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2344-324-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2840-397-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/2840-206-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3172-321-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3404-188-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3404-192-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3456-251-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3456-247-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3568-297-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3568-387-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3568-177-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3688-296-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3884-216-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3884-215-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3892-222-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3936-229-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/3936-230-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4120-175-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4120-391-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4296-365-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4316-354-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4324-396-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4324-330-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4516-274-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4548-385-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4548-246-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4548-389-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4660-185-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4756-337-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4816-132-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4816-228-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4816-398-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4868-362-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4988-171-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4992-154-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/4992-153-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/5024-388-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

  • memory/5116-294-0x0000000000400000-0x0000000000436000-memory.dmp

    Filesize

    216KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.