Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2022 15:13

General

  • Target

    360TS_Setup_Mini.exe

  • Size

    1.5MB

  • MD5

    858ee6ceb590822f57d2d98a32e3c5af

  • SHA1

    0cd9e539e919dd0367c1d04e2644bc3e8ad109e5

  • SHA256

    3d505dd5081824da4517fbdc2a4da8c6133538b72171e260f59d10be5ed20acb

  • SHA512

    ad624bba251a6131471a662e31a676c6facb335aef433b0c2313adb57c2ca4701590845c3c237d190a1817fa43daeaaeb3731c91e19045691523cccf9cbbd198

  • SSDEEP

    24576:AD1YS7FpyUxT3DC2O1zj1SqdAGFQZIxvC45UJoenm9x:TQ5xT3DDWzjYq+ZIxL5UJoew

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 8 IoCs
  • Executes dropped EXE 17 IoCs
  • Modifies Installed Components in the registry 2 TTPs 6 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Sets service image path in registry 2 TTPs 8 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 4 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks for any installed AV software in registry 1 TTPs 25 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Writes to the Master Boot Record (MBR) 1 TTPs 7 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 12 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: LoadsDriver 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\360TS_Setup_Mini.exe
        "C:\Users\Admin\AppData\Local\Temp\360TS_Setup_Mini.exe"
        2⤵
        • Loads dropped DLL
        • Writes to the Master Boot Record (MBR)
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe
          "C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe" /c:101 /pmode:2 /syncid0_1
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of WriteProcessMemory
          PID:1876
          • C:\Program Files (x86)\1672330491_0\360TS_Setup.exe
            "C:\Program Files (x86)\1672330491_0\360TS_Setup.exe" /c:101 /pmode:2 /syncid0_1 /TSinstall
            4⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Sets service image path in registry
            • Checks computer location settings
            • Loads dropped DLL
            • Adds Run key to start application
            • Checks for any installed AV software in registry
            • Checks whether UAC is enabled
            • Writes to the Master Boot Record (MBR)
            • Drops file in Program Files directory
            • Checks processor information in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: LoadsDriver
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1328
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\Total Security\MenuEx64.dll"
              5⤵
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1832
              • C:\Windows\system32\regsvr32.exe
                /s "C:\Program Files (x86)\360\Total Security\MenuEx64.dll"
                6⤵
                • Modifies system executable filetype association
                • Registers COM server for autorun
                • Loads dropped DLL
                • Modifies registry class
                PID:956
            • C:\Program Files (x86)\360\Total Security\Utils\PowerSaver.exe
              "C:\Program Files (x86)\360\Total Security\Utils\PowerSaver.exe" /flightsigning
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:1252
            • C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe
              "C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe" /install
              5⤵
              • Drops file in Drivers directory
              • Executes dropped EXE
              • Sets service image path in registry
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:572
            • C:\Program Files (x86)\360\Total Security\modules\KB931125-rootsupd.exe
              "C:\Program Files (x86)\360\Total Security\modules\KB931125-rootsupd.exe"
              5⤵
              • Executes dropped EXE
              • Modifies Installed Components in the registry
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              PID:2544
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe authroots.sst
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                PID:2572
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe updroots.sst
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                PID:2596
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe -l roots.sst
                6⤵
                • Executes dropped EXE
                • Modifies system certificate store
                PID:2620
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe -d delroots.sst
                6⤵
                • Executes dropped EXE
                PID:2644
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\Total Security\safemon\safemon64.dll"
              5⤵
                PID:2668
                • C:\Windows\system32\regsvr32.exe
                  /s "C:\Program Files (x86)\360\Total Security\safemon\safemon64.dll"
                  6⤵
                    PID:2696
        • C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe
          "C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe"
          1⤵
          • Executes dropped EXE
          • Sets service image path in registry
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Enumerates connected drives
          • Writes to the Master Boot Record (MBR)
          • Drops file in System32 directory
          • Modifies data under HKEY_USERS
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe
            /showtrayicon
            2⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1800
            • C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe
              "C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe" /install
              3⤵
              • Executes dropped EXE
              PID:2016
            • C:\Program Files (x86)\360\Total Security\safemon\PopWndLog.exe
              "C:\Program Files (x86)\360\Total Security\safemon\PopWndLog.exe" /cleantip=1
              3⤵
              • Executes dropped EXE
              • Writes to the Master Boot Record (MBR)
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:1096
            • C:\Windows\SysWOW64\regsvr32.exe
              C:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\360\Total Security\safemon\safemon.dll"
              3⤵
              • Installs/modifies Browser Helper Object
              • Modifies registry class
              PID:1520
            • C:\ProgramData\360TotalSecurity\DesktopPlus\DesktopPlus.exe
              "C:\ProgramData\360TotalSecurity\DesktopPlus\DesktopPlus.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2148
              • C:\ProgramData\360TotalSecurity\DesktopPlus\DesktopPlus64.exe
                "C:\ProgramData\360TotalSecurity\DesktopPlus\DesktopPlus64.exe" /lowrun
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Writes to the Master Boot Record (MBR)
                • Drops file in Windows directory
                • Suspicious use of SetWindowsHookEx
                PID:2192
          • C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe
            "C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe" /watch
            2⤵
            • Executes dropped EXE
            PID:2068
          • C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe
            "C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe"
            2⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            PID:2160

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\1672330491_0\360TS_Setup.exe

          Filesize

          92.8MB

          MD5

          4b78ca0f2616ea2062401e4aab555433

          SHA1

          c9b3c66e9198f0a8dc640c53dd08af346cc63027

          SHA256

          a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

          SHA512

          978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

        • C:\Program Files (x86)\360\Total Security\MenuEx64.dll

          Filesize

          388KB

          MD5

          d569954dc1054b6e7d3b495782634034

          SHA1

          dfaf57da05704261aa54afaa658d4e61a64fa7f2

          SHA256

          11294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80

          SHA512

          b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e

        • C:\Program Files (x86)\360\Total Security\Utils\PowerSaver.exe

          Filesize

          145KB

          MD5

          a99cc896f427963a7b7545a85a09b743

          SHA1

          360dec0169904782cfe871ba32d0ed3563c8fa62

          SHA256

          192b065887382e2755b2223b6a956ff1670b78d561012e0b1cbf862d90b46559

          SHA512

          5d745f0e9f10c24382948df7363424c6baa0dde6fb6a446bc6490bcfe4167d40acbfa1e2b1ebb0ca60595e59ad309def6ff3a4e8c8f23ac38fd6190f9b9a3285

        • C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe

          Filesize

          1.1MB

          MD5

          7e0bce805d94db8b88971a0fe03ec52e

          SHA1

          f4ce366ed9958d1f25426e5914b6806aa9790a33

          SHA256

          e4c4fcf88132c1970ccb9ec8f43dc7d1ee193ad552ccdef8ab166959a25696c2

          SHA512

          d631b6d22b057fc6f385a701eb9c8895fd59d692fbf14f6f87242837b1c9df745493fe35adebeee4c2099ac544800f9fd205d4e76dd2bbd85b601de80854908b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8

          Filesize

          2KB

          MD5

          f7d1d25a4bb9539426866bd092721c19

          SHA1

          5c2bf9edfdae783797538617e6b453f984d37167

          SHA256

          73783350d643231a95bd81354713994eeb2ebd3cc6e80733922f2ff7e232fd37

          SHA512

          55b08279b76e264847c53396e22c71cea9a8296fe38948fc6f2a44c2af4a3101f072d8038c8a45e934f0000c102dda5ad6c09a4d5d80a4b6f61277aeb8ee61a4

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          61KB

          MD5

          fc4666cbca561e864e7fdf883a9e6661

          SHA1

          2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

          SHA256

          10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

          SHA512

          c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

          Filesize

          1KB

          MD5

          a2b3de2676790ac64a1bc51ba3e667d1

          SHA1

          2a7f7090fed2ddd299339197428a9fafc3fd349b

          SHA256

          aa8cdcc9c8c19d24037aa62dfb529b22d25a7eb3927d35f59572c153c81c5a4a

          SHA512

          ab9e80a077a2fe486630e4d7fb159994224fce41c6fbc6197cc600e4fac86d504e8b3d1670ca628fb45792498be42a80e1c6b0af4b3e7451bc039222ea123ef5

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8

          Filesize

          488B

          MD5

          df514217aba49cf1547378475c18ef1f

          SHA1

          18da0220a1b8627eb42c19a3572725a346aded2e

          SHA256

          db3d1d99cb6e7691a409e578d119f7346becacd8a59610f5cf9701ebc878c7c8

          SHA512

          123be70fb23800c28563ae74bbbe66b5b48b6ab64e472b0ef8ab5171b139545bf5be08738378044ad16112834230f5b7860f42d37e83c3f89543007611a81313

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          5f855a04cdfd31ff2c52004493fb05f3

          SHA1

          01ab8d653200ec473f0b1fc3aaebcd07158c1cd2

          SHA256

          fe53d7eb821f51a3a7f7b26d46c73aaa921553c49d55afffd147f1d6fe7d0f35

          SHA512

          3469679d622b80015409ba5777df7bbede1e1d31b9ad86e3efcda8f58e62bdc465d7d691b4e91e0fb9a1456b9efed45fe25d1750f050181edeff195a8729113b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

          Filesize

          482B

          MD5

          74c6474ec54bbe5bdd9678a130e09862

          SHA1

          cd752f1d99de303e1d85c80cd935eaa6ceba071a

          SHA256

          ef2b435581f3732b2059ef2e2f4efc205fc0a98195d029ad6e2fb1c14d4c4e1f

          SHA512

          9aededb0d6042a562cdc6555d504de6d2815ea83a7f740a5fc9380bf4486c1d54f05972f6ad3fd7d872782dd2e52b38858c6cbfb7c220a1393458d0c46d02996

        • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe

          Filesize

          92.8MB

          MD5

          4b78ca0f2616ea2062401e4aab555433

          SHA1

          c9b3c66e9198f0a8dc640c53dd08af346cc63027

          SHA256

          a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

          SHA512

          978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

        • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe

          Filesize

          92.8MB

          MD5

          4b78ca0f2616ea2062401e4aab555433

          SHA1

          c9b3c66e9198f0a8dc640c53dd08af346cc63027

          SHA256

          a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

          SHA512

          978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

        • \Program Files (x86)\1672330491_0\360TS_Setup.exe

          Filesize

          92.8MB

          MD5

          4b78ca0f2616ea2062401e4aab555433

          SHA1

          c9b3c66e9198f0a8dc640c53dd08af346cc63027

          SHA256

          a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

          SHA512

          978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

        • \Program Files (x86)\360\Total Security\360Base.dll

          Filesize

          965KB

          MD5

          4f241e5de9091f6d78469bf1dc141cbd

          SHA1

          dec02d084f94049a4087a0f23db063ecaf98269a

          SHA256

          b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

          SHA512

          2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

        • \Program Files (x86)\360\Total Security\360Base.dll

          Filesize

          965KB

          MD5

          4f241e5de9091f6d78469bf1dc141cbd

          SHA1

          dec02d084f94049a4087a0f23db063ecaf98269a

          SHA256

          b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

          SHA512

          2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

        • \Program Files (x86)\360\Total Security\360Base.dll

          Filesize

          965KB

          MD5

          4f241e5de9091f6d78469bf1dc141cbd

          SHA1

          dec02d084f94049a4087a0f23db063ecaf98269a

          SHA256

          b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

          SHA512

          2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

        • \Program Files (x86)\360\Total Security\360Base.dll

          Filesize

          965KB

          MD5

          4f241e5de9091f6d78469bf1dc141cbd

          SHA1

          dec02d084f94049a4087a0f23db063ecaf98269a

          SHA256

          b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

          SHA512

          2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

        • \Program Files (x86)\360\Total Security\360NetBase.dll

          Filesize

          1.4MB

          MD5

          14c6b4bbd31f6fd13530bc941cc71d1a

          SHA1

          ce4e38ac82a54f64d318507ddc28f9ffbb378f0f

          SHA256

          401d8529a84f1d80a439be8cd4e869202162458e5afb5e5bac97c4859bfe8eb5

          SHA512

          c16d525f1d3fc098b4d6c8b8a872a9013ef2f945f27af73ed7826f61a2b80d756ae5348105432909eccc71f03834cd1301f87fa5a0107e0c7137f5c8e3a3cc95

        • \Program Files (x86)\360\Total Security\360TSCommon.dll

          Filesize

          483KB

          MD5

          fd9ec3f6ae3ec4e72c7d8adb9d977480

          SHA1

          304b83eb514354a86c9b136ac32badcec616fed8

          SHA256

          deddae3c60a724e167107cda7d4ad0481d8ab451f61081eff7730d0f114da918

          SHA512

          22a47674c2000c175594e8b9f95d23665481a2f2c84f8870a4ad58095aa107b9a0ba61a5315ebdfcd1ec6a4b3031bb3e21ee6e2624d57daae20c587592cce5fd

        • \Program Files (x86)\360\Total Security\I18N.dll

          Filesize

          95KB

          MD5

          7e181b91215ae31b6717926501093bc4

          SHA1

          8fcf05c9ac64c46c87acc1ec67631e7b66363d9e

          SHA256

          239824a487ae786daadc9e556c185561378f47ec7ba6b216c17242aea3a78ff9

          SHA512

          0df684bdd9c0a5cce81db692e336dcf3e8c8aec80d5d6fb8620227e2f31d5bfd1d63f9cb7f808cb9511fe483e7798fa6d5a51c0bb1ec3c3c86400767a17a155f

        • \Program Files (x86)\360\Total Security\MenuEx64.dll

          Filesize

          388KB

          MD5

          d569954dc1054b6e7d3b495782634034

          SHA1

          dfaf57da05704261aa54afaa658d4e61a64fa7f2

          SHA256

          11294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80

          SHA512

          b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e

        • \Program Files (x86)\360\Total Security\MenuEx64.dll

          Filesize

          388KB

          MD5

          d569954dc1054b6e7d3b495782634034

          SHA1

          dfaf57da05704261aa54afaa658d4e61a64fa7f2

          SHA256

          11294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80

          SHA512

          b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e

        • \Program Files (x86)\360\Total Security\QHSafeMain.exe

          Filesize

          4.9MB

          MD5

          23de0575cc6db3b843ed86765fc315d3

          SHA1

          f8495e703dc1da0464358a8a109c3f7524f148e6

          SHA256

          8bf27f702cafe890916a9b8b41954d2deaae281f2e3a5a797d1adac8b93d2a7b

          SHA512

          65baf75a7f0006062d05b1471f7d66d6c8e63311b41fed63c3030e719d13a20287296380aee45668a18dfbb7d6a34261f3b33e2b0098b6f90fb31a8201dc61fa

        • \Program Files (x86)\360\Total Security\QHSafeMain.exe

          Filesize

          4.9MB

          MD5

          23de0575cc6db3b843ed86765fc315d3

          SHA1

          f8495e703dc1da0464358a8a109c3f7524f148e6

          SHA256

          8bf27f702cafe890916a9b8b41954d2deaae281f2e3a5a797d1adac8b93d2a7b

          SHA512

          65baf75a7f0006062d05b1471f7d66d6c8e63311b41fed63c3030e719d13a20287296380aee45668a18dfbb7d6a34261f3b33e2b0098b6f90fb31a8201dc61fa

        • \Program Files (x86)\360\Total Security\QHSafeMain.exe

          Filesize

          4.9MB

          MD5

          23de0575cc6db3b843ed86765fc315d3

          SHA1

          f8495e703dc1da0464358a8a109c3f7524f148e6

          SHA256

          8bf27f702cafe890916a9b8b41954d2deaae281f2e3a5a797d1adac8b93d2a7b

          SHA512

          65baf75a7f0006062d05b1471f7d66d6c8e63311b41fed63c3030e719d13a20287296380aee45668a18dfbb7d6a34261f3b33e2b0098b6f90fb31a8201dc61fa

        • \Program Files (x86)\360\Total Security\QHSafeMain.exe

          Filesize

          4.9MB

          MD5

          23de0575cc6db3b843ed86765fc315d3

          SHA1

          f8495e703dc1da0464358a8a109c3f7524f148e6

          SHA256

          8bf27f702cafe890916a9b8b41954d2deaae281f2e3a5a797d1adac8b93d2a7b

          SHA512

          65baf75a7f0006062d05b1471f7d66d6c8e63311b41fed63c3030e719d13a20287296380aee45668a18dfbb7d6a34261f3b33e2b0098b6f90fb31a8201dc61fa

        • \Program Files (x86)\360\Total Security\QHVer.dll

          Filesize

          22KB

          MD5

          8338ded55a057f285dd476d0a65961d1

          SHA1

          40e80790eec0300a1bb3a90bc3dd3a058dcdb58d

          SHA256

          9f48f5b3d0086c61ec00a54d14bb48f55d118045a96c7f0e153ed187c2247202

          SHA512

          54073a45b5fcd4bfbe8e2b8d632eaeaa1669bd69ba3f728dff13f5a3cd20713eb3e96b16d8b45bac6ca9bcafbdbc727214824a165bbb4b43ea74e08a0ec817e1

        • \Program Files (x86)\360\Total Security\QHVer.dll

          Filesize

          22KB

          MD5

          8338ded55a057f285dd476d0a65961d1

          SHA1

          40e80790eec0300a1bb3a90bc3dd3a058dcdb58d

          SHA256

          9f48f5b3d0086c61ec00a54d14bb48f55d118045a96c7f0e153ed187c2247202

          SHA512

          54073a45b5fcd4bfbe8e2b8d632eaeaa1669bd69ba3f728dff13f5a3cd20713eb3e96b16d8b45bac6ca9bcafbdbc727214824a165bbb4b43ea74e08a0ec817e1

        • \Program Files (x86)\360\Total Security\QHVer.dll

          Filesize

          22KB

          MD5

          8338ded55a057f285dd476d0a65961d1

          SHA1

          40e80790eec0300a1bb3a90bc3dd3a058dcdb58d

          SHA256

          9f48f5b3d0086c61ec00a54d14bb48f55d118045a96c7f0e153ed187c2247202

          SHA512

          54073a45b5fcd4bfbe8e2b8d632eaeaa1669bd69ba3f728dff13f5a3cd20713eb3e96b16d8b45bac6ca9bcafbdbc727214824a165bbb4b43ea74e08a0ec817e1

        • \Program Files (x86)\360\Total Security\QHVer.dll

          Filesize

          22KB

          MD5

          8338ded55a057f285dd476d0a65961d1

          SHA1

          40e80790eec0300a1bb3a90bc3dd3a058dcdb58d

          SHA256

          9f48f5b3d0086c61ec00a54d14bb48f55d118045a96c7f0e153ed187c2247202

          SHA512

          54073a45b5fcd4bfbe8e2b8d632eaeaa1669bd69ba3f728dff13f5a3cd20713eb3e96b16d8b45bac6ca9bcafbdbc727214824a165bbb4b43ea74e08a0ec817e1

        • \Program Files (x86)\360\Total Security\QHVer.dll

          Filesize

          22KB

          MD5

          8338ded55a057f285dd476d0a65961d1

          SHA1

          40e80790eec0300a1bb3a90bc3dd3a058dcdb58d

          SHA256

          9f48f5b3d0086c61ec00a54d14bb48f55d118045a96c7f0e153ed187c2247202

          SHA512

          54073a45b5fcd4bfbe8e2b8d632eaeaa1669bd69ba3f728dff13f5a3cd20713eb3e96b16d8b45bac6ca9bcafbdbc727214824a165bbb4b43ea74e08a0ec817e1

        • \Program Files (x86)\360\Total Security\QHVer.dll

          Filesize

          22KB

          MD5

          8338ded55a057f285dd476d0a65961d1

          SHA1

          40e80790eec0300a1bb3a90bc3dd3a058dcdb58d

          SHA256

          9f48f5b3d0086c61ec00a54d14bb48f55d118045a96c7f0e153ed187c2247202

          SHA512

          54073a45b5fcd4bfbe8e2b8d632eaeaa1669bd69ba3f728dff13f5a3cd20713eb3e96b16d8b45bac6ca9bcafbdbc727214824a165bbb4b43ea74e08a0ec817e1

        • \Program Files (x86)\360\Total Security\Utils\PowerSaver.exe

          Filesize

          145KB

          MD5

          a99cc896f427963a7b7545a85a09b743

          SHA1

          360dec0169904782cfe871ba32d0ed3563c8fa62

          SHA256

          192b065887382e2755b2223b6a956ff1670b78d561012e0b1cbf862d90b46559

          SHA512

          5d745f0e9f10c24382948df7363424c6baa0dde6fb6a446bc6490bcfe4167d40acbfa1e2b1ebb0ca60595e59ad309def6ff3a4e8c8f23ac38fd6190f9b9a3285

        • \Program Files (x86)\360\Total Security\deepscan\BAPI.dll

          Filesize

          247KB

          MD5

          c9dcd0eb8bc1ac4abb1e978de496d11a

          SHA1

          43ed0869766dc114ab05baa2095c907dea5a1827

          SHA256

          a173bd0c2bc2b1626c721da9530f3a1b2f2e3006383b533899a78edebab78c74

          SHA512

          151fe785153aef21b262347212cc035ba606ae86e24021ee436cded6b5746c4e0b7239664ee9aff5add0f2402a95f6035d9cd003b504c8e08554569b3659966a

        • \Program Files (x86)\360\Total Security\deepscan\BAPIDRV64.sys

          Filesize

          220KB

          MD5

          a0548b4b596728fed439e0f1adc46dfb

          SHA1

          5ef61bd4e975678ecae7161ed5970d44c1d18e82

          SHA256

          74b388a28556785c5f0e29c2907730294130974820c43097162d8bc2d57457f3

          SHA512

          1fea401c54193b982de13dddd65a9f3ffa08b8d8ce70684f08cb5c504ac777e86f4523acd69629165a2675b37c4cfdb31175b5ce61261f0beb47bb2899509f92

        • \Program Files (x86)\360\Total Security\deepscan\BAPIDRV64.sys

          Filesize

          220KB

          MD5

          a0548b4b596728fed439e0f1adc46dfb

          SHA1

          5ef61bd4e975678ecae7161ed5970d44c1d18e82

          SHA256

          74b388a28556785c5f0e29c2907730294130974820c43097162d8bc2d57457f3

          SHA512

          1fea401c54193b982de13dddd65a9f3ffa08b8d8ce70684f08cb5c504ac777e86f4523acd69629165a2675b37c4cfdb31175b5ce61261f0beb47bb2899509f92

        • \Program Files (x86)\360\Total Security\deepscan\BAPIDRV64.sys

          Filesize

          220KB

          MD5

          a0548b4b596728fed439e0f1adc46dfb

          SHA1

          5ef61bd4e975678ecae7161ed5970d44c1d18e82

          SHA256

          74b388a28556785c5f0e29c2907730294130974820c43097162d8bc2d57457f3

          SHA512

          1fea401c54193b982de13dddd65a9f3ffa08b8d8ce70684f08cb5c504ac777e86f4523acd69629165a2675b37c4cfdb31175b5ce61261f0beb47bb2899509f92

        • \Program Files (x86)\360\Total Security\deepscan\BAPIDRV64.sys

          Filesize

          220KB

          MD5

          a0548b4b596728fed439e0f1adc46dfb

          SHA1

          5ef61bd4e975678ecae7161ed5970d44c1d18e82

          SHA256

          74b388a28556785c5f0e29c2907730294130974820c43097162d8bc2d57457f3

          SHA512

          1fea401c54193b982de13dddd65a9f3ffa08b8d8ce70684f08cb5c504ac777e86f4523acd69629165a2675b37c4cfdb31175b5ce61261f0beb47bb2899509f92

        • \Program Files (x86)\360\Total Security\deepscan\qutmload.dll

          Filesize

          111KB

          MD5

          b2fd7b345d3683210a2a465a886ddb9e

          SHA1

          2aa774cbae5c9460945ffb850b990d3159c091f6

          SHA256

          eed8df7dc1f0e59b367cf49aa53c91f05953d0164f2d0900ab8ec738a413e5e1

          SHA512

          62e29140ae56b9aaa1872a070ef343e085802fc9dd46245456326a67288d452e81d986672ea30d232c9241011412af728672d6b6844b481037f448e8c180cf4c

        • \Program Files (x86)\360\Total Security\filemon\360AvFlt.dll

          Filesize

          53KB

          MD5

          da5e35c6395a34acaa5a0eb9b71ff85a

          SHA1

          5da7e723aaa5859ab8f227455d80d8afa7696e22

          SHA256

          5e11c25e4d6e146c5e10fcbc21b2cdb5e97ec47f25c416e5d263985f3d964172

          SHA512

          49660339594abff9b0590bc3f401634a514834cf98fa8715b05a57a3cea575d74859681984d8c2c601d5fe947701f8f110450fac764a5d32096e24d7eadcdd2c

        • \Program Files (x86)\360\Total Security\filemon\AVCheck.dll

          Filesize

          321KB

          MD5

          0fc2f13d9e0cfbd4903a77051348d16a

          SHA1

          c1df2fe56cbd15271020e48751c39ab482f6eaca

          SHA256

          7b79ca1ec9ea05d6549218af8c646f8cb25c563e66d810ca8890340066cff72b

          SHA512

          6977514116a2fa2c0a884b46975cfa048d966448e493c1415467d6be8719c6b40db0181a861f9e0ef53aa90a3b04012e02e6aecb70230745c487355170416efc

        • \Program Files (x86)\360\Total Security\ipc\360Box.dll

          Filesize

          50KB

          MD5

          f398c9c333589ed57bb5a99eb2d32d13

          SHA1

          1fcac85e06506f332cae1d29451abe6808d8d39b

          SHA256

          1587d34c58ff2376384a0f3b279248d080724809eaf5f251cc2dda7896f04602

          SHA512

          0282f9ab1084fe093e097b6c33adfe2de59d4ed3a9eae12698df7295498ba56d4e8250a130af9f7284cd962691340246a15b3d32e9bf1df22ddd128f44d1205c

        • \Program Files (x86)\360\Total Security\ipc\360boxmain.exe

          Filesize

          923KB

          MD5

          209ee3f2b59730ba6e1413c3e0c6ee09

          SHA1

          de702e0f1571fdc0e9c31dd289572c6d5fd688ad

          SHA256

          0352b4b7908255b9487e3581a521152b7a0ab62e428f13186d23bf41c3e3941f

          SHA512

          9ee6d26909d620d4776355d5f6390a79b0420ebe5263322c294047b628410d8338407768ced6f6cdd0b7b38ca890f3c6315c3d659fdd8975a0cc3f0a279ff854

        • \Program Files (x86)\360\Total Security\ipc\360hvm.dll

          Filesize

          23KB

          MD5

          e540bc23b3f5934dee4d7b7b39fc3ac2

          SHA1

          465f0b0e4fe49b81a43980dd0cf40e068e98abed

          SHA256

          e794c636a50b5f51e0bd233c59c9144277a94792d3537460123a39c583d01421

          SHA512

          39412ddea1f7b16ae1b6d89db7f7c24b92b1b310f3d9191ab82bfa01283044d3c4e991a5fd4efee98d00c1e65d76328bd396138e5dfc90f44ed49ed605f8e764

        • \Program Files (x86)\360\Total Security\ipc\360hvm64.sys

          Filesize

          330KB

          MD5

          f93fa692aa3658422997643f51c1b7d8

          SHA1

          d00ddf850a7f937d1a75c401227a70fd80718171

          SHA256

          3c9da5ab28427405bf1099c1e7c3e77683c658c0c7c5fc458f606f368e7c6fc6

          SHA512

          b30b87b49f0155f2e310730a71e39de041b74d2aab53215089fc61be700854d5576c540eca34da774c358fd89e516204be14519576e2946a05b1f90318659745

        • \Program Files (x86)\360\Total Security\ipc\360hvm64.sys

          Filesize

          330KB

          MD5

          f93fa692aa3658422997643f51c1b7d8

          SHA1

          d00ddf850a7f937d1a75c401227a70fd80718171

          SHA256

          3c9da5ab28427405bf1099c1e7c3e77683c658c0c7c5fc458f606f368e7c6fc6

          SHA512

          b30b87b49f0155f2e310730a71e39de041b74d2aab53215089fc61be700854d5576c540eca34da774c358fd89e516204be14519576e2946a05b1f90318659745

        • \Program Files (x86)\360\Total Security\ipc\DrvUtility.dll

          Filesize

          171KB

          MD5

          bc8917f469a0e356c015ad6a31acc134

          SHA1

          a2e0fbcff53018ed92754065beb0a16e35339cf3

          SHA256

          4f798cf1e27dd355709c4ebe11a24b17ee832b4051f8952d9ae12942e0ccc5a9

          SHA512

          f9039ea609c18174dd76f5a89b6af4908573fe194cfaf412430c755da0626dce7b92f668e5cac6b195c91f17cc4eaf4ddb963b95bc6de7483c05436f7f4f59c8

        • \Program Files (x86)\360\Total Security\ipc\X64For32Lib.dll

          Filesize

          59KB

          MD5

          bdce31fc701c9aa16ca392a561ba102d

          SHA1

          58bbdeb96e7819b00d60f0e6580dfc455774a9f7

          SHA256

          3305ad2718c9bb9bd1db19cde17a184e0d7e497ff3930050c74875bc50f9690b

          SHA512

          2a16cc0a0bf718f661a3abe8f36b87c8b13716d5bdaa4c2768840734321f879de3d60255b67b2b858eabd627cf4302d7be0a29648bb65bedbfb5f838c9b96863

        • \Program Files (x86)\360\Total Security\ipc\sbmon.dll

          Filesize

          366KB

          MD5

          c0805da6b17d760418fd2fd031880934

          SHA1

          f9cf240f7bd4dbd31bc57913ab6517f0dc17d7a5

          SHA256

          edf443a3751d042fe16b8b11b484357a1b4702310bb50fb7aba9d68725803612

          SHA512

          f1c458ac3c1eb6ec67b4b0c54aaef09258e41ad4fbd3cd429da3bde278dba09c2419a79625aa39bb231ef277f803cf5ea568c82eaf028cd7a23a6a2fe74306ae

        • \Program Files (x86)\360\Total Security\netmon\360netctrl.dll

          Filesize

          382KB

          MD5

          30c9d5470142edf4d69b00aff040f822

          SHA1

          7c21ed33749b58c10ad7e1d95c922244eec62fcf

          SHA256

          b76103ff3d6faa46537d3db213270a086ae3b5b58fe6841b03cd5f9f73c54247

          SHA512

          c385b70414823107903fc1eec608b064360337114dc8a6d307f2caad9ec5ec7e53a2850f26b5374deaa97b2c727206f08a0a2037d12550e6449632d165b03b7f

        • \Program Files (x86)\360\Total Security\netmon\netmstart.dll

          Filesize

          169KB

          MD5

          b1f70f9be9df8bb186c5bc5159690a1f

          SHA1

          0c9347ac3245cdeb8dcea9b3edf01fe4cfd33fe2

          SHA256

          ce993f7583b1f253c6d82027b89fd867390ea1563564da75684d293539edc6a2

          SHA512

          188419d1cbc4f1b1bec99bf77f716bb004a0228d3d36eca9d2e479735efae8970dff62f5df42f01e8174173537f0d68ae37b9d5b70b0698b52f50ee0aacc5231

        • \Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe

          Filesize

          1.1MB

          MD5

          7e0bce805d94db8b88971a0fe03ec52e

          SHA1

          f4ce366ed9958d1f25426e5914b6806aa9790a33

          SHA256

          e4c4fcf88132c1970ccb9ec8f43dc7d1ee193ad552ccdef8ab166959a25696c2

          SHA512

          d631b6d22b057fc6f385a701eb9c8895fd59d692fbf14f6f87242837b1c9df745493fe35adebeee4c2099ac544800f9fd205d4e76dd2bbd85b601de80854908b

        • \Users\Admin\AppData\Local\Temp\1672330490_00000000_base\360base.dll

          Filesize

          884KB

          MD5

          8c42fc725106cf8276e625b4f97861bc

          SHA1

          9c4140730cb031c29fc63e17e1504693d0f21c13

          SHA256

          d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

          SHA512

          f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

        • \Users\Admin\AppData\Local\Temp\1672330502_00000000_base\360base.dll

          Filesize

          884KB

          MD5

          8c42fc725106cf8276e625b4f97861bc

          SHA1

          9c4140730cb031c29fc63e17e1504693d0f21c13

          SHA256

          d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

          SHA512

          f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

        • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe

          Filesize

          92.8MB

          MD5

          4b78ca0f2616ea2062401e4aab555433

          SHA1

          c9b3c66e9198f0a8dc640c53dd08af346cc63027

          SHA256

          a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

          SHA512

          978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

        • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe

          Filesize

          92.8MB

          MD5

          4b78ca0f2616ea2062401e4aab555433

          SHA1

          c9b3c66e9198f0a8dc640c53dd08af346cc63027

          SHA256

          a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

          SHA512

          978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

        • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe

          Filesize

          92.8MB

          MD5

          4b78ca0f2616ea2062401e4aab555433

          SHA1

          c9b3c66e9198f0a8dc640c53dd08af346cc63027

          SHA256

          a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

          SHA512

          978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

        • \Users\Admin\AppData\Local\Temp\360TS_Setup.exe

          Filesize

          92.8MB

          MD5

          4b78ca0f2616ea2062401e4aab555433

          SHA1

          c9b3c66e9198f0a8dc640c53dd08af346cc63027

          SHA256

          a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

          SHA512

          978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

        • \Users\Admin\AppData\Local\Temp\360_install_20221229161504_7165313\7z.dll

          Filesize

          1.1MB

          MD5

          e74067bfda81cd82fe3a5fc2fdb87e2b

          SHA1

          de961204751d9af1bab9c2a9ba16edc7a4ae7388

          SHA256

          898bf5db34d9997b3d90b87091f34ae4e3e9cf34b6f2ae7fb8fd86e8a1bb684e

          SHA512

          c0b1d851d97df2635b865d7f0a252881eef622363e08190e1f45ec308fdbd81f94ece53a6c2b1b36c38fcb82c2b8262f31a936a399cee567631b9146cf3ef60a

        • \Users\Admin\AppData\Local\Temp\{456A5AC5-0CFE-4288-B71D-4420BDDF2603}.tmp\360P2SP.dll

          Filesize

          824KB

          MD5

          fc1796add9491ee757e74e65cedd6ae7

          SHA1

          603e87ab8cb45f62ecc7a9ef52d5dedd261ea812

          SHA256

          bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60

          SHA512

          8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

        • \Windows\System32\drivers\BAPIDRV64.SYS

          Filesize

          220KB

          MD5

          a0548b4b596728fed439e0f1adc46dfb

          SHA1

          5ef61bd4e975678ecae7161ed5970d44c1d18e82

          SHA256

          74b388a28556785c5f0e29c2907730294130974820c43097162d8bc2d57457f3

          SHA512

          1fea401c54193b982de13dddd65a9f3ffa08b8d8ce70684f08cb5c504ac777e86f4523acd69629165a2675b37c4cfdb31175b5ce61261f0beb47bb2899509f92

        • \Windows\System32\drivers\BAPIDRV64.SYS

          Filesize

          220KB

          MD5

          a0548b4b596728fed439e0f1adc46dfb

          SHA1

          5ef61bd4e975678ecae7161ed5970d44c1d18e82

          SHA256

          74b388a28556785c5f0e29c2907730294130974820c43097162d8bc2d57457f3

          SHA512

          1fea401c54193b982de13dddd65a9f3ffa08b8d8ce70684f08cb5c504ac777e86f4523acd69629165a2675b37c4cfdb31175b5ce61261f0beb47bb2899509f92

        • \Windows\System32\drivers\BAPIDRV64.SYS

          Filesize

          220KB

          MD5

          a0548b4b596728fed439e0f1adc46dfb

          SHA1

          5ef61bd4e975678ecae7161ed5970d44c1d18e82

          SHA256

          74b388a28556785c5f0e29c2907730294130974820c43097162d8bc2d57457f3

          SHA512

          1fea401c54193b982de13dddd65a9f3ffa08b8d8ce70684f08cb5c504ac777e86f4523acd69629165a2675b37c4cfdb31175b5ce61261f0beb47bb2899509f92

        • \Windows\System32\drivers\BAPIDRV64.SYS

          Filesize

          220KB

          MD5

          a0548b4b596728fed439e0f1adc46dfb

          SHA1

          5ef61bd4e975678ecae7161ed5970d44c1d18e82

          SHA256

          74b388a28556785c5f0e29c2907730294130974820c43097162d8bc2d57457f3

          SHA512

          1fea401c54193b982de13dddd65a9f3ffa08b8d8ce70684f08cb5c504ac777e86f4523acd69629165a2675b37c4cfdb31175b5ce61261f0beb47bb2899509f92

        • memory/572-127-0x0000000000000000-mapping.dmp

        • memory/956-120-0x0000000000000000-mapping.dmp

        • memory/956-121-0x000007FEFB6A1000-0x000007FEFB6A3000-memory.dmp

          Filesize

          8KB

        • memory/1096-134-0x0000000000000000-mapping.dmp

        • memory/1212-183-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-170-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-199-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-198-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-197-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-196-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-194-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-195-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-191-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-193-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-192-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-189-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-190-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-188-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-187-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-186-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-149-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-150-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-151-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-152-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-153-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-154-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-155-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-156-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-157-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-158-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-159-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-160-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-161-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-162-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-163-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-164-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-165-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-166-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-167-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-168-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-169-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-185-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-171-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-172-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-173-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-174-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-175-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-176-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-177-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-178-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-179-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-180-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-181-0x0000000002150000-0x0000000002151000-memory.dmp

          Filesize

          4KB

        • memory/1212-182-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1212-184-0x0000000003B20000-0x0000000003B21000-memory.dmp

          Filesize

          4KB

        • memory/1252-124-0x0000000000000000-mapping.dmp

        • memory/1328-66-0x0000000000000000-mapping.dmp

        • memory/1520-137-0x0000000000000000-mapping.dmp

        • memory/1688-54-0x0000000075601000-0x0000000075603000-memory.dmp

          Filesize

          8KB

        • memory/1760-136-0x0000000002030000-0x0000000002618000-memory.dmp

          Filesize

          5.9MB

        • memory/1760-138-0x0000000002030000-0x0000000002618000-memory.dmp

          Filesize

          5.9MB

        • memory/1800-131-0x0000000000000000-mapping.dmp

        • memory/1800-139-0x0000000005CD0000-0x00000000062B8000-memory.dmp

          Filesize

          5.9MB

        • memory/1800-141-0x0000000005CD0000-0x00000000062B8000-memory.dmp

          Filesize

          5.9MB

        • memory/1832-116-0x0000000000000000-mapping.dmp

        • memory/1876-60-0x0000000000000000-mapping.dmp

        • memory/2016-133-0x0000000000000000-mapping.dmp

        • memory/2068-142-0x0000000000000000-mapping.dmp

        • memory/2148-143-0x0000000000000000-mapping.dmp

        • memory/2160-144-0x0000000000000000-mapping.dmp

        • memory/2192-147-0x0000000000000000-mapping.dmp

        • memory/2544-207-0x0000000000000000-mapping.dmp

        • memory/2572-209-0x0000000000000000-mapping.dmp

        • memory/2596-211-0x0000000000000000-mapping.dmp

        • memory/2620-213-0x0000000000000000-mapping.dmp

        • memory/2644-215-0x0000000000000000-mapping.dmp

        • memory/2668-217-0x0000000000000000-mapping.dmp

        • memory/2696-219-0x0000000000000000-mapping.dmp