Analysis

  • max time kernel
    400s
  • max time network
    402s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2022 00:48

General

  • Target

    360TS_Setup_Mini.exe

  • Size

    1.5MB

  • MD5

    858ee6ceb590822f57d2d98a32e3c5af

  • SHA1

    0cd9e539e919dd0367c1d04e2644bc3e8ad109e5

  • SHA256

    3d505dd5081824da4517fbdc2a4da8c6133538b72171e260f59d10be5ed20acb

  • SHA512

    ad624bba251a6131471a662e31a676c6facb335aef433b0c2313adb57c2ca4701590845c3c237d190a1817fa43daeaaeb3731c91e19045691523cccf9cbbd198

  • SSDEEP

    24576:AD1YS7FpyUxT3DC2O1zj1SqdAGFQZIxvC45UJoenm9x:TQ5xT3DDWzjYq+ZIxL5UJoew

Malware Config

Extracted

Path

C:\Program Files\WinRAR\Rar.txt

Ransom Note
User's Manual ~~~~~~~~~~~~~ RAR 6.11 console version ~~~~~~~~~~~~~~~~~~~~~~~~ =-=-=-=-=-=-=-=-=-=-=-=-=-=- Welcome to the RAR Archiver! -=-=-=-=-=-=-=-=-=-=-=-=-=-= Introduction ~~~~~~~~~~~~ RAR is a console application allowing to manage archive files in command line mode. RAR provides compression, encryption, data recovery and many other functions described in this manual. RAR supports only RAR format archives, which have .rar file name extension by default. ZIP and other formats are not supported. Even if you specify .zip extension when creating an archive, it will still be in RAR format. Windows users may install WinRAR, which supports more archive types including RAR and ZIP formats. WinRAR provides both graphical user interface and command line mode. While console RAR and GUI WinRAR have the similar command line syntax, some differences exist. So it is recommended to use this rar.txt manual for console RAR (rar.exe in case of Windows version) and winrar.chm WinRAR help file for GUI WinRAR (winrar.exe). Configuration file ~~~~~~~~~~~~~~~~~~ RAR and UnRAR for Unix read configuration information from .rarrc file in a user's home directory (stored in HOME environment variable) or in /etc directory. RAR and UnRAR for Windows read configuration information from rar.ini file, placed in the same directory as the rar.exe file. This file can contain the following string: switches=<any RAR switches separated by spaces> For example: switches=-m5 -s It is also possible to specify separate switch sets for individual RAR commands using the following syntax: switches_<command>=<any RAR switches separated by spaces> For example: switches_a=-m5 -s switches_x=-o+ Environment variable ~~~~~~~~~~~~~~~~~~~~ Default parameters may be added to the RAR command line by establishing an environment variable "RAR". For instance, in Unix following lines may be added to your profile: RAR='-s -md1024' export RAR RAR will use this string as default parameters in the command line and will create "solid" archives with 1024 MB sliding dictionary size. RAR handles options with priority as following: command line switches highest priority switches in the RAR variable lower priority switches saved in configuration file lowest priority Log file ~~~~~~~~ If switch -ilog is specified in the command line or configuration file, RAR will write informational messages about errors encountered while processing archives into a log file. Read the switch -ilog description for more details. The file order list for solid archiving - rarfiles.lst ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ rarfiles.lst contains a user-defined file list, which tells RAR the order in which to add files to a solid archive. It may contain file names, wildcards and special entry - $default. The default entry defines the place in order list for files not matched with other entries in this file. The comment character is ';'. In Windows this file should be placed in the same directory as RAR or in %APPDATA%\WinRAR directory, in Unix - to the user's home directory or in /etc. Tips to provide improved compression and speed of operation: - similar files should be grouped together in the archive; - frequently accessed files should be placed at the beginning. Normally masks placed nearer to the top of list have a higher priority, but there is an exception from this rule. If rarfiles.lst contains such two masks that all files matched by one mask are also matched by another, that mask which matches a smaller subset of file names will have higher priority regardless of its position in the list. For example, if you have *.cpp and f*.cpp masks, f*.cpp has a higher priority, so the position of 'filename.cpp' will be chosen according to 'f*.cpp', not '*.cpp'. RAR command line syntax ~~~~~~~~~~~~~~~~~~~~~~~ Syntax RAR <command> [ -<switches> ] <archive> [ <@listfiles...> ] [ <files...> ] [ <path_to_extract\> ] Description Command is a single character or string specifying an action to be performed by RAR. Switches are designed to modify the way RAR performs such action. Other parameters are archive name and files to be archived or extracted. Listfiles are plain text files containing names of files to process. File names must start at the first column. It is possible to put comments to the listfile after // characters. For example, you can create backup.lst containing the following strings: c:\work\doc\*.txt //backup text documents c:\work\image\*.bmp //backup pictures c:\work\misc and then run: rar a backup @backup.lst If you wish to read file names from stdin (standard input), specify the empty listfile name (just @). By default, console RAR uses the single byte encoding in list files, but it can be redefined with -sc<charset>l switch. You can specify both usual file names and list files in the same command line. If neither files nor listfiles are specified, then *.* is implied and RAR will process all files. path_to_extract includes the destination directory name followed by a path separator character. For example, it can be c:\dest\ in Windows or data/ in Unix. It specifies the directory to place extracted files in 'x' and 'e' commands. This directory is created by RAR if it does not exist yet. Alternatively it can be set with -op<path> switch. Many RAR commands, such as extraction, test or list, allow to use wildcards in archive name. If no extension is specified in archive mask, RAR assumes .rar, so * means all archives with .rar extension. If you need to process all archives without extension, use *. mask. *.* mask selects all files. Wildcards in archive name are not allowed when archiving and deleting. In Unix you need to enclose RAR command line parameters containing wildcards in single or double quotes to prevent their expansion by Unix shell. For example, this command will extract *.asm files from all *.rar archives in current directory: rar e '*.rar' '*.asm' Command could be any of the following: a Add files to archive. Examples: 1) add all *.hlp files from the current directory to the archive help.rar: rar a help *.hlp 2) archive all files from the current directory and subdirectories to 362000 bytes size solid, self-extracting volumes and add the recovery record to each volume: rar a -r -v362 -s -sfx -rr save Because no file names are specified, all files (*) are assumed. 3) as a special exception, if directory name is specified as an argument and if directory name does not include file masks and trailing path separator, the entire contents of the directory and all subdirectories will be added to the archive even if switch -r is not specified. The following command will add all files from the directory Bitmaps and its subdirectories to the RAR archive Pictures.rar: rar a Pictures.rar Bitmaps 4) if directory name includes the trailing path separator, normal rules apply and you need to specify switch -r to process its subdirectories. The following command will add all files from directory Bitmaps, but not from its subdirectories, because switch -r is not specified: rar a Pictures.rar Bitmaps\* c Add archive comment. Comments are displayed while the archive is being processed. Comment length is limited to 256 KB. Examples: rar c distrib.rar Also comments may be added from a file using -z[file] switch. The following command adds a comment from info.txt file: rar c -zinfo.txt dummy ch Change archive parameters. This command can be used with most of archive modification switches to modify archive parameters. It is especially convenient for switches like -cl, -cu, -tl, which do not have a dedicated command. It is not able to recompress, encrypt or decrypt archive data and it cannot merge or create volumes. If used without any switches, 'ch' command just copies the archive data without modification. Example: Set archive time to latest file: rar ch -tl files.rar cw Write archive comment to specified file. Format of output file depends on -sc switch. If output file name is not specified, comment data will be sent to stdout. Examples: 1) rar cw arc comment.txt 2) rar cw -scuc arc unicode.txt 3) rar cw arc d Delete files from archive. If this command removes all files from archive, the empty archive is removed. e Extract files without archived paths. Extract files excluding their path component, so all files are created in the same destination directory. Use 'x' command if you wish to extract full pathnames. Example: rar e -or html.rar *.css css\ extract all *.css files from html.rar archive to 'css' directory excluding archived paths. Rename extracted files automatically in case several files have the same name. f Freshen files in archive. Updates archived files older than files to add. This command will not add new files to the archive. i[i|c|h|t]=<string> Find string in archives. Supports following optional parameters: i - case insensitive search (default); c - case sensitive search; h - hexadecimal search; t - use ANSI, UTF-8, UTF-16 and OEM (Windows only) character tables; If no parameters are specified, it is possible to use the simplified command syntax i<string> instead of i=<string> It is allowed to specify 't' modifier with other parameters, for example, ict=string performs case sensitive search using all mentioned above character tables. Examples: 1) rar "ic=first level" -r c:\*.rar *.txt Perform case sensitive search of "first level" string in *.txt files in *.rar archives on the disk c: 2) rar ih=f0e0aeaeab2d83e3a9 -r e:\texts\*.rar Search for hex string f0 e0 ae ae ab 2d 83 e3 a9 in rar archives in e:\texts directory. k Lock archive. RAR cannot modify locked archives, so locking important archives prevents their accidental modification by RAR. Such protection might be especially useful in case of RAR commands processing archives in groups. This command is not intended or able to prevent modification by other tools or willful third party. It implements a safety measure only for accidental data change by RAR. Example: rar k final.rar l[t[a],b] List archive contents [technical [all], bare]. 'l' command lists archived file attributes, size, date, time and name, one file per line. If file is encrypted, line starts from '*' character. 'lt' displays the detailed file information in multiline mode. This information includes file checksum value, host OS, compression options and other parameters. 'lta' provide the detailed information not only for files, but also for service headers like NTFS streams or file security data. 'lb' lists bare file names with path, one per line, without any additional information. You can use -v switch to list contents of all volumes in volume set: rar l -v vol.part1.rar Commands 'lt', 'lta' and 'lb' are equal to 'vt', 'vta' and 'vb' correspondingly. m[f] Move to archive [files only]. Moving files and directories results in the files and directories being erased upon successful completion of the packing operation. Directories will not be removed if 'f' modifier is used and/or '-ed' switch is applied. p Print file to stdout. Send unpacked file data to stdout. Informational messages are suppressed with this command, so they are not mixed with file data. r Repair archive. Archive repairing is performed in two stages. First, the damaged archive is searched for a recovery record (see 'rr' command). If archive contains the previously added recovery record and if damaged data area is continuous and smaller than error correction code size in recovery record, chance of successful archive reconstruction is high. When this stage has been completed, a new archive is created, named as fixed.arcname.rar, where 'arcname' is the original (damaged) archive name. If broken archive does not contain a recovery record or if archive is not completely recovered due to major damage, second stage is performed. During this stage only the archive structure is reconstructed and it is impossible to recover files which fail checksum validation, it is still possible, however, to recover undamaged files, which were inaccessible due to the broken archive structure. Mostly this is useful for non-solid archives. This stage is never efficient for archives with encrypted file headers, which can be repaired only if recovery record is present. When the second stage is completed, the reconstructed archive is saved as rebuilt.arcname.rar, where 'arcname' is the original archive name. By default, repaired archives are created in the current directory, but you can append an optional destpath\ parameter to specify another destination directory. Example: rar r buggy.rar c:\fixed\ repair buggy.rar and place the result to 'c:\fixed' directory. rc Reconstruct missing and damaged volumes using recovery volumes (.rev files). You need to specify any existing .rar or .rev volume as the archive name. Example: rar rc backup.part03.rar Read 'rv' command description for information about recovery volumes. rn Rename archived files. The command syntax is: rar rn <arcname> <srcname1> <destname1> ... <srcnameN> <destnameN> For example, the following command: rar rn data.rar readme.txt readme.bak info.txt info.bak will rename readme.txt to readme.bak and info.txt to info.bak in the archive data.rar. It is allowed to use wildcards in the source and destination names for simple name transformations

Extracted

Path

C:\Program Files\WinRAR\WhatsNew.txt

Ransom Note
WinRAR - What's new in the latest version Version 6.11 1. Added support for Gz archives with large archive comments. Previously the extraction command failed to unpack gz archives if comment size exceeded 16 KB. 2. Archive comments in gz archives are displayed in the comment window and recognized by "Show information" command. Large comments are shown partially. Previous versions didn't display Gzip comments. 3. Reserved device names followed by file extension, such as aux.txt, are extracted as is in Windows 11 even without "Allow potentially incompatible names" option or -oni command line switch. Unlike previous Windows versions, Windows 11 treats such names as usual files. Device names without extension, such as aux, still require these options to be unpacked as is regardless of Windows version. 4. Switch -mes can be also used to suppress the password prompt and abort when adding files to encrypted solid archive. 5. Additional measures to prevent extracting insecure links are implemented. 6. Bugs fixed: a) if password exceeding 127 characters was entered when unpacking an encrypted archive with console RAR, text after 127th character could be erroneously recognized as user's input by different prompts issued later; b) wrong archived file time could be displayed in overwrite prompt when extracting a file from ZIP archive. It happened if such archive included extended file times and was created in another time zone. It didn't affect the actual file time, which was set properly upon extraction. Version 6.10 1. WinRAR can unpack contents of .zst and .zipx archives utilizing Zstandard algorithm. 2. Added support of Windows 11 Explorer context menus. Beginning from Windows 11, an application can add only a single top level command or submenu to Explorer context menu. If "Cascaded context menus" in "Integration settings" dialog is on, this single item is a submenu storing all necessary WinRAR commands. If this option is off, only one extraction command for archives and one archiving command for usual files are available. You can select these commands with "Context menu items..." button in "Integration settings" dialog. 3. "Legacy context menus" option in "Settings/Integration" dialog can be used in Windows 11 if WinRAR commands are missing in "Show more options" Windows legacy context menu or in context menus of third party file managers. If WinRAR commands are already present here, keep "Legacy context menus" option turned off to prevent duplicating them. This option is not available in Windows 10 and older. 4. Windows XP is not supported anymore. Minimum required operating system version is Windows Vista. 5. "Close" item is added to "When done" list on "Advanced" page of archiving dialog. It closes WinRAR window, when archiving is done. 6. "When done" list is added to "Options" page of extraction dialog. It allows to select an action like turning a computer off or closing WinRAR after completing extraction. 7. Switch -si can be used when extracting or testing to read archive data from stdin, such as: type docs.rar | rar x -si -o+ -pmypwd dummy docs\ Even though the archive name is ignored with this switch, an arbitrary dummy archive name has to specified in the command line. Operations requiring backward seeks are unavailable in this mode. It includes displaying archive comments, testing the recovery record, utilizing the quick open information, processing multivolume archives. Prompts requiring user interaction are not allowed. Use -o[+|-|r], -p<pwd> or -mes switches to suppress such prompts. 8. New -ep4<path> switch excludes the path prefix when archiving or extracting if this path is found in the beginning of archived name. Path is compared with names already prepared to store in archive, without drive letters and leading path separators. For example: rar a -ep4texts\books archive c:\texts\books\technical removes "text\books" from archived names, so they start from 'technical'. 9. New -mes switch skips encrypted files when extracting or testing. It replaces the former -p- switch. 10. New -op<path> switch sets the destination folder for 'x' and 'e' extraction commands. Unlike <path_to_extract\> command line parameter, this switch also accepts paths without trailing path separator character. 11. If 'p' command is used to print a file to stdout, informational messages are suppressed automatically to prevent them mixing with file data. 12. "Generate archive name by mask" option and switch -ag treat only first two 'M' characters after 'H' as minutes. Previously any amount of such characters was considered as minutes. It makes possible to place the time field before the date, like -agHHMM-DDMMYY. Previous versions considered all 'M' in this string as minutes. 13. Maximum allowed size of RAR5 recovery record is increased to 1000% of protected data size. Maximum number of RAR5 recovery volumes can be 10 times larger than protected RAR volumes. Previous WinRAR versions are not able to use the recovery record to repair broken archives if recovery record size exceeds 99%. Similarly, previous versions cannot use recovery volumes if their number is equal or larger than number of RAR volumes. 14. Warning is issued if entered password exceeds the allowed limit of 127 characters and is truncated. Previously such passwords had been truncated silently. 15. If archive includes reserved device names, the underscore character is inserted in the beginning of such names when extracting. For example, aux.txt is converted to _aux.txt. It is done to prevent compatibility problems with software unable to process such names. You can use "Allow potentially incompatible names" option in "Advanced" part of extraction dialog or command line -oni switch to avoid this conversion. 16. WinRAR attempts to reset the file cache before testing an archive. It helps to verify actual data written to disk instead of reading a cached copy. 17. Multiple -v<size> switches specifying different sizes for different volumes are now allowed also for ZIP archives: WinRAR a -v100k -v200k -v300k arcname.zip Previously multiple -v<size> switches were supported only for RAR archives. 18. Switches -sl<size> and -sm<size> can be used in WinRAR.exe command line mode when extracting archives in any supported formats, provided that such archive includes unpacked file sizes. Previously these switches could filter files by size only in RAR and ZIP archives. 19. Newer folder selection dialog is invoked when pressing "Browse" button in WinRAR "Settings/Paths" page, "Repair" and "Convert" commands, also as in few other similar places. Previously a simpler XP style folder selection dialog was opened. 20. When restoring from tray after completing an operation, WinRAR window is positioned under other opened windows, to not interfere with current user activities. 21. "650 MB CD" is removed and "2 GB volumes" is added to the list of predefined volume sizes in "Define volume sizes" dialog invoked from WinRAR "Settings/Compression". 22. "Rename" command selects the file name part up to the final dot. Previously it selected the entire name. 23. If SFX archive size exceeds 4 GB, an error message is issued during compression, immediately after exceeding this threshold. Previously this error was reported only after completing compression. Executables of such size cannot be started by Windows. 24. Command line -en switch is not supported anymore. It created RAR4 archives without the end of archive record. End of archive record permits to gracefully skip external data like digital signatures. 25. Bugs fixed: a) when editing a file inside of .rar or .zip archive, WinRAR created a new SFX archive instead of updating an existing archive if "Create SFX archive" option was set in the default compression profile; b) the total progress could be displayed incorrectly when using -oi, -f, -u switches or appropriate GUI options; c) "Find files" command with "Use all tables" option and command line "it" commands failed to find strings in UTF-16 encoding. Version 6.02 1. ZIP SFX module refuses to process SFX commands stored in archive comment if such comment is resided after beginning of Authenticode digital signature. It is done to prevent possible attacks with inclusion of ZIP archive into the signature body. We already prohibited extracting contents of such malformed archives in WinRAR 6.01. We are thankful to Jacob Thompson - Mandiant Advantage Labs for reporting this issue. 2. WinRAR uses https instead of http in the web notifier window, home page and themes links. It also implements additional checks within the web notifier. This is done to prevent a malicious web page from executing existing files on a user's computer. Such attack is only possible if the intruder has managed to spoof or otherwise control user's DNS records. Some other factors are also involved in limiting the practical application of this attack. We would like to express our gratitude to Igor Sak-Sakovskiy for bringing this issue to our attention. 3. Where appropriate, SFX archive displays the additional line with detailed error information provided by operating system. For example, previously such archive would display "Cannot create file" message alone. Now this message is followed by a detailed reason like access denied or file being used by another process. In the past this extended error information was available in WinRAR, but not in SFX archives. 4. Switch -idn hides archived names also in 'v' and 'l' commands. It can be useful if only the archive type or total information is needed. 5. If -ibck -ri<priority> switches are used together, WinRAR process sets the priority specified in -ri switch. Previous versions ignored -ri and set the priority to low in the presence of -ibck switch. 6. When using "File/Change drive" command, WinRAR saves the last folder of previous drive and restores it if that drive is selected again later. 7. Name of unpacking file is now included into WinRAR incorrect password warning for RAR5 archives. It can be helpful when unpacking a non-solid archive containing files encrypted with different passwords. 8. Bugs fixed: a) "Convert archives" command issued erroneous "The specified password is incorrect" message after succesfully converting RAR archive with encrypted file names if new password was set and archive was opened in WinRAR shell; b) if command progress window was resized up and then quickly resized down to original dimensions, window contents could be positioned incorrectly. Version 6.01 1. Ctrl+A keyboard shortcut selects the entire text in WinRAR comment window. 2. If -idn switch is used together with -t or -df in console RAR when archiving, it additionally disables "Deleting <filename>" or "Testing <filename>" messages, normally issued by these switches. Also -idn disables folder creation messages when extracting a file to non-existing folder. 3. WinRAR and ZIP SFX module refuse to extract contents of ZIP SFX archives if ZIP central directory is resided after beginning of Authenticode digital signature. It is done to prevent possible attacks with inclusion of ZIP archive into signature body. 4. Bugs fixed: a) "Convert archives" command could incorrectly convert Unicode comments in RAR archives. b) if two archive information windows had been opened from Explorer context menu, the compression ratio bar in the first window could erroneously display a value for second archive. It did not affect the ratio and other text details at the right of window. Only the vertical bar at the left could be updated to a wrong value; c) if "Wait if other WinRAR copies are active" option was enabled in extraction dialog, "Waiting for another WinRAR copy" title was not set in command progress window while waiting; d) when extracting a symbolic link, previous versions did not overwrite existing symbolic links even if user requested it in overwrite prompt. Version 6.00 1. "Ignore" and "Ignore All" options are added to read error prompt. "Ignore" allows to continue processing with already read file part only and "Ignore All" does it for all future read errors. For example, if you archive a file, which portion is locked by another process, and if "Ignore" is selected in read error prompt, only a part of file preceding the unreadable region will be saved into archive. It can help to avoid interrupting lengthy archiving operations, though be aware that files archived with "Ignore" are incomplete. If switch -y is specified, "Ignore" is applied to all files by default. Previously available "Retry" and "Quit" options are still present in read error prompt as well. 2. Exit code 12 is returned in the command line mode in case of read errors. This code is returned for all options in the read error prompt, including a newly introduced "Ignore" option. Previously more common fatal error code 2 was returned for read errors. 3. If several archives are selected, "Extract archives to" option group in "Options" page of extraction dialog can be used to place extracted files to specified destination folder, to separate subfolders in destination folder, to separate subfolders in archive folders and directly to archive folders. It replaces "Extract archives to subfolders" option and available only if multiple archives are selected. 4. New -ad2 switch places extracted files directly to archive's own folder. Unlike -ad1, it does not create a separate subfolder for each unpacked archive. 5. "Additional switches" option in "Options" page of archiving and extraction dialogs allows to specify WinRAR command line switches. It might be useful if there is no option in WinRAR graphical interface matching a switch. Use this feature only if you are familiar with WinRAR command line syntax and clearly understand what specified switches are intended for. 6. Compression parameters in "Benchmark" command are changed to 32 MB dictionary and "Normal" method. They match RAR5 default mode and more suitable to estimate the typical performance of recent WinRAR versions than former 4 MB "Best" intended for RAR4 format. Latest "Benchmark" results cannot be compared with previous versions directly. New parameters set produces different values, likely lower because of eight times larger dictionary size. 7. When unpacking a part of files from solid volume set, WinRAR attempts to skip volumes in the beginning and
URLs

https

http

http://weirdsgn.com

http://icondesignlab.com

https://rarlab.com/themes/WinRAR_Classic_48x36.theme.rar

Signatures

  • Modifies system executable filetype association 2 TTPs 10 IoCs
  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 13 IoCs
  • Executes dropped EXE 49 IoCs
  • Modifies Installed Components in the registry 2 TTPs 6 IoCs
  • Registers COM server for autorun 1 TTPs 6 IoCs
  • Sets service image path in registry 2 TTPs 14 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 15 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks for any installed AV software in registry 1 TTPs 44 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 17 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 14 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 24 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies data under HKEY_USERS 57 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\360TS_Setup_Mini.exe
      "C:\Users\Admin\AppData\Local\Temp\360TS_Setup_Mini.exe"
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe
        "C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe" /c:101 /pmode:2 /syncid0_1
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4056
        • C:\Program Files (x86)\1672365003_0\360TS_Setup.exe
          "C:\Program Files (x86)\1672365003_0\360TS_Setup.exe" /c:101 /pmode:2 /syncid0_1 /TSinstall
          4⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Sets service image path in registry
          • Checks computer location settings
          • Loads dropped DLL
          • Adds Run key to start application
          • Checks for any installed AV software in registry
          • Checks whether UAC is enabled
          • Writes to the Master Boot Record (MBR)
          • Drops file in Program Files directory
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: LoadsDriver
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:5108
          • C:\Users\Admin\AppData\Local\Temp\1672365048_00000000_wscreg\WscReg.exe
            /regas:1_1
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:3332
          • C:\Windows\system32\bcdedit.exe
            "C:\Windows\system32\bcdedit.exe" /set {bootmgr} flightsigning on
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:2596
          • C:\Windows\system32\bcdedit.exe
            "C:\Windows\system32\bcdedit.exe" /set flightsigning on
            5⤵
            • Modifies boot configuration data using bcdedit
            PID:4732
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\Total Security\MenuEx64.dll"
            5⤵
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:4720
            • C:\Windows\system32\regsvr32.exe
              /s "C:\Program Files (x86)\360\Total Security\MenuEx64.dll"
              6⤵
              • Modifies system executable filetype association
              • Registers COM server for autorun
              • Loads dropped DLL
              • Modifies registry class
              PID:4092
          • C:\Program Files (x86)\360\Total Security\Utils\PowerSaver.exe
            "C:\Program Files (x86)\360\Total Security\Utils\PowerSaver.exe" /flightsigning
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4408
          • C:\Program Files (x86)\360\Total Security\safemon\WscReg.exe
            "C:\Program Files (x86)\360\Total Security\safemon\WscReg.exe" /installsrv
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1344
          • C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe
            "C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe" /install
            5⤵
            • Drops file in Drivers directory
            • Executes dropped EXE
            • Sets service image path in registry
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3108
          • C:\Program Files (x86)\360\Total Security\modules\KB931125-rootsupd.exe
            "C:\Program Files (x86)\360\Total Security\modules\KB931125-rootsupd.exe"
            5⤵
            • Executes dropped EXE
            • Modifies Installed Components in the registry
            • Suspicious use of SetWindowsHookEx
            PID:1656
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe authroots.sst
              6⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious use of SetWindowsHookEx
              PID:1256
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe updroots.sst
              6⤵
              • Executes dropped EXE
              • Modifies system certificate store
              • Suspicious use of SetWindowsHookEx
              PID:3896
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe -l roots.sst
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3356
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe
              C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\updroots.exe -d delroots.sst
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1900
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\Total Security\safemon\safemon64.dll"
            5⤵
              PID:3716
              • C:\Windows\system32\regsvr32.exe
                /s "C:\Program Files (x86)\360\Total Security\safemon\safemon64.dll"
                6⤵
                  PID:1376
      • C:\Program Files (x86)\360\Total Security\safemon\WscReg.exe
        "C:\Program Files (x86)\360\Total Security\safemon\WscReg.exe"
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3756
        • C:\Program Files (x86)\360\Total Security\SoftMgr\EaInstHelper64.exe
          "C:\Program Files (x86)\360\Total Security\SoftMgr\EaInstHelper64.exe" /Install_run
          2⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          • Sets service image path in registry
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          PID:3504
      • C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe
        "C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe"
        1⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Sets service image path in registry
        • Loads dropped DLL
        • Adds Run key to start application
        • Checks for any installed AV software in registry
        • Checks whether UAC is enabled
        • Enumerates connected drives
        • Writes to the Master Boot Record (MBR)
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Checks SCSI registry key(s)
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:400
        • C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe
          /showtrayicon
          2⤵
          • Executes dropped EXE
          • Sets service image path in registry
          • Checks computer location settings
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Writes to the Master Boot Record (MBR)
          • Drops file in Program Files directory
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe
            "C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe" /install
            3⤵
            • Executes dropped EXE
            PID:2588
          • C:\Program Files (x86)\360\Total Security\safemon\PopWndLog.exe
            "C:\Program Files (x86)\360\Total Security\safemon\PopWndLog.exe" /cleantip=1
            3⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:444
            • C:\Program Files (x86)\360\Total Security\safemon\PopWndLog.exe
              "C:\Program Files (x86)\360\Total Security\safemon\PopWndLog.exe" /ExShowTrayIcon
              4⤵
              • Executes dropped EXE
              PID:2188
          • C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe
            "C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe" /ExShowTrayIcon
            3⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            PID:5028
          • C:\Windows\SysWOW64\regsvr32.exe
            C:\Windows\system32\regsvr32.exe /s "C:\Program Files (x86)\360\Total Security\safemon\safemon.dll"
            3⤵
              PID:480
            • C:\ProgramData\360TotalSecurity\DesktopPlus\DesktopPlus.exe
              "C:\ProgramData\360TotalSecurity\DesktopPlus\DesktopPlus.exe"
              3⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2264
              • C:\ProgramData\360TotalSecurity\DesktopPlus\DesktopPlus64.exe
                "C:\ProgramData\360TotalSecurity\DesktopPlus\DesktopPlus64.exe" /lowrun
                4⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Writes to the Master Boot Record (MBR)
                • Modifies Control Panel
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:632
          • C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe
            "C:\Program Files (x86)\360\Total Security\safemon\QHWatchdog.exe" /watch
            2⤵
            • Executes dropped EXE
            PID:868
          • C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe
            "C:\Program Files (x86)\360\Total Security\safemon\QHSafeTray.exe"
            2⤵
            • Executes dropped EXE
            • Writes to the Master Boot Record (MBR)
            PID:4928
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\Total Security\safemon\bdfltlib.dll"
            2⤵
              PID:4700
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\360\Total Security\safemon\scan.dll"
              2⤵
                PID:1984
              • C:\Program Files (x86)\360\Total Security\QHSafeMain.exe
                "C:\Program Files (x86)\360\Total Security\QHSafeMain.exe" /install
                2⤵
                • Executes dropped EXE
                • Checks computer location settings
                • Checks for any installed AV software in registry
                • Checks whether UAC is enabled
                • Drops desktop.ini file(s)
                • Enumerates connected drives
                • Modifies WinLogon
                • Writes to the Master Boot Record (MBR)
                • Drops file in System32 directory
                • Drops file in Program Files directory
                • Drops file in Windows directory
                • Checks processor information in registry
                • Modifies Control Panel
                • Modifies Internet Explorer settings
                • Modifies registry class
                • Modifies system certificate store
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SetWindowsHookEx
                PID:4024
                • C:\Program Files (x86)\360\Total Security\PromoUtil.exe
                  "C:\Program Files (x86)\360\Total Security\PromoUtil.exe"
                  3⤵
                  • Executes dropped EXE
                  • Writes to the Master Boot Record (MBR)
                  • Suspicious use of SetWindowsHookEx
                  PID:1752
                  • C:\Program Files (x86)\360\Total Security\Utils\cef\cefutil.exe
                    /lang=en
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:3136
                    • C:\Program Files (x86)\360\Total Security\Utils\cef\cefutil.exe
                      "C:\Program Files (x86)\360\Total Security\Utils\cef\cefutil.exe" --type=renderer --disable-gpu-compositing --no-sandbox --lang=en-US --lang=en-US --log-file="C:\Program Files (x86)\360\Total Security\Utils\cef\debug.log" --log-severity=disable --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="3136.0.1442896302\1287148021" /prefetch:1
                      5⤵
                      • Executes dropped EXE
                      PID:3608
                    • C:\Program Files (x86)\360\Total Security\Utils\cef\cefutil.exe
                      "C:\Program Files (x86)\360\Total Security\Utils\cef\cefutil.exe" --type=renderer --disable-gpu-compositing --no-sandbox --lang=en-US --lang=en-US --log-file="C:\Program Files (x86)\360\Total Security\Utils\cef\debug.log" --log-severity=disable --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --content-image-texture-target=3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553,3553 --video-image-texture-target=3553 --disable-accelerated-video-decode --disable-webrtc-hw-encoding --disable-gpu-compositing --channel="3136.1.1511230812\1430405047" /prefetch:1
                      5⤵
                      • Executes dropped EXE
                      PID:1448
                    • C:\Program Files (x86)\360\Total Security\Utils\cef\cefutil.exe
                      "C:\Program Files (x86)\360\Total Security\Utils\cef\cefutil.exe" --type=utility --channel="3136.2.775570120\1113285401" --lang=en-US --no-sandbox --no-sandbox --lang=en-US --log-file="C:\Program Files (x86)\360\Total Security\Utils\cef\debug.log" --log-severity=disable /prefetch:8
                      5⤵
                      • Executes dropped EXE
                      PID:5412
                • C:\Program Files (x86)\360\Total Security\softmgr\360InstantSetup.exe
                  "C:\Program Files (x86)\360\Total Security\softmgr\360InstantSetup.exe" /tools_src=page
                  3⤵
                  • Executes dropped EXE
                  • Writes to the Master Boot Record (MBR)
                  • Drops file in Program Files directory
                  • Modifies system certificate store
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:660
                  • C:\Program Files (x86)\360\Total Security\LiveUpdate360.exe
                    "C:\Program Files (x86)\360\Total Security\LiveUpdate360.exe" /s
                    4⤵
                    • Executes dropped EXE
                    • Writes to the Master Boot Record (MBR)
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    • Suspicious use of SendNotifyMessage
                    • Suspicious use of SetWindowsHookEx
                    PID:4732
                  • C:\Program Files (x86)\360\Total Security\softmgr\360InstantSetup.exe
                    "C:\Program Files (x86)\360\Total Security\softmgr\360InstantSetup.exe" /installproxy
                    4⤵
                    • Executes dropped EXE
                    • Writes to the Master Boot Record (MBR)
                    PID:1728
                    • C:\Users\Public\Downloads\WinRAR_is_64.exe
                      "C:\Users\Public\Downloads\WinRAR_is_64.exe" /S
                      5⤵
                      • Executes dropped EXE
                      • Checks computer location settings
                      PID:3504
                      • C:\Program Files\WinRAR\uninstall.exe
                        "C:\Program Files\WinRAR\uninstall.exe" /setup
                        6⤵
                        • Modifies system executable filetype association
                        • Executes dropped EXE
                        • Registers COM server for autorun
                        • Modifies registry class
                        • Suspicious use of SetWindowsHookEx
                        PID:384
                  • C:\Program Files (x86)\360\Total Security\softmgr\360InstantSetup.exe
                    "C:\Program Files (x86)\360\Total Security\softmgr\360InstantSetup.exe" /installproxy
                    4⤵
                    • Executes dropped EXE
                    • Writes to the Master Boot Record (MBR)
                    PID:1836
                    • C:\Users\Public\Downloads\Opera_90.0.4480.80_Setup.exe
                      "C:\Users\Public\Downloads\Opera_90.0.4480.80_Setup.exe" --silent --allusers=0 --otd="utm.medium:pb,utm.source:360,utm.campaign:noext"
                      5⤵
                      • Executes dropped EXE
                      PID:2740
                      • C:\Users\Public\Downloads\Opera_90.0.4480.80_Setup.exe
                        C:\Users\Public\Downloads\Opera_90.0.4480.80_Setup.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=90.0.4480.80 --initial-client-data=0x324,0x328,0x32c,0x300,0x330,0x6f2389c8,0x6f2389d8,0x6f2389e4
                        6⤵
                        • Executes dropped EXE
                        PID:2380
                  • C:\Program Files (x86)\360\Total Security\softmgr\360InstantSetup.exe
                    "C:\Program Files (x86)\360\Total Security\softmgr\360InstantSetup.exe" /installproxy
                    4⤵
                    • Executes dropped EXE
                    • Writes to the Master Boot Record (MBR)
                    PID:548
                    • C:\Users\Public\Downloads\SkypeSetupFull_7.32.99.104_is.exe
                      "C:\Users\Public\Downloads\SkypeSetupFull_7.32.99.104_is.exe" /VERYSILENT /SP- /NOCANCEL /NORESTART /SUPPRESSMSGBOXES /NOLAUNCH /DIR="C:\Program Files (x86)\Skype\"
                      5⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      PID:4480
                  • C:\Program Files (x86)\360\Total Security\PromoUtil.exe
                    /tp:1009
                    4⤵
                    • Executes dropped EXE
                    PID:6012
                • C:\Program Files (x86)\360\Total Security\360DeskAna.exe
                  "C:\Program Files (x86)\360\Total Security\360DeskAna.exe" lspscan 32 \\.\pipe\lspscanalsqjzqy
                  3⤵
                  • Executes dropped EXE
                  PID:5040
                • C:\Program Files (x86)\360\Total Security\360DeskAna.exe
                  "C:\Program Files (x86)\360\Total Security\360DeskAna.exe" lspscan 32 \\.\pipe\lspscanalsqjzqy
                  3⤵
                  • Executes dropped EXE
                  PID:3572
                • C:\Program Files (x86)\360\Total Security\360DeskAna64.exe
                  "C:\Program Files (x86)\360\Total Security\360DeskAna64.exe" EnumProcDLL: "explorer.exe","","0"
                  3⤵
                  • Executes dropped EXE
                  PID:3844
                • C:\Program Files (x86)\360\Total Security\360DeskAna64.exe
                  "C:\Program Files (x86)\360\Total Security\360DeskAna64.exe" EnumProcDLL: "iexplore.exe","","0"
                  3⤵
                  • Executes dropped EXE
                  PID:5064
                • C:\Program Files (x86)\360\Total Security\360DeskAna64.exe
                  "C:\Program Files (x86)\360\Total Security\360DeskAna64.exe" EnumProcDLL: "explorer.exe","","0"
                  3⤵
                  • Executes dropped EXE
                  PID:5032
                • C:\Program Files (x86)\360\Total Security\360DeskAna64.exe
                  "C:\Program Files (x86)\360\Total Security\360DeskAna64.exe" EnumProcDLL: "iexplore.exe","","0"
                  3⤵
                  • Executes dropped EXE
                  PID:1652
                • C:\Program Files (x86)\360\Total Security\360DeskAna64.exe
                  "C:\Program Files (x86)\360\Total Security\360DeskAna64.exe" EnumProcDLL: "explorer.exe","","0"
                  3⤵
                  • Executes dropped EXE
                  PID:1268
                • C:\Program Files (x86)\360\Total Security\360DeskAna64.exe
                  "C:\Program Files (x86)\360\Total Security\360DeskAna64.exe" EnumProcDLL: "iexplore.exe","","0"
                  3⤵
                  • Executes dropped EXE
                  PID:4808
              • C:\Program Files (x86)\360\Total Security\360TsLiveUpd.exe
                "C:\Program Files (x86)\360\Total Security\360TsLiveUpd.exe" /delay:30
                2⤵
                • Executes dropped EXE
                • Writes to the Master Boot Record (MBR)
                PID:4296
              • C:\Windows\SysWOW64\gpupdate.exe
                C:\Windows\system32\gpupdate.exe /force
                2⤵
                  PID:4964
              • C:\Windows\system32\msiexec.exe
                C:\Windows\system32\msiexec.exe /V
                1⤵
                • Drops desktop.ini file(s)
                • Enumerates connected drives
                • Drops file in Program Files directory
                • Drops file in Windows directory
                • Modifies Internet Explorer settings
                • Modifies data under HKEY_USERS
                • Modifies registry class
                PID:392
                • C:\Windows\syswow64\MsiExec.exe
                  C:\Windows\syswow64\MsiExec.exe -Embedding 3942D63F2367407F737E9D0CBF7AA274
                  2⤵
                    PID:5316
                  • C:\Windows\syswow64\MsiExec.exe
                    C:\Windows\syswow64\MsiExec.exe -Embedding 2C822A9FD65783285D70C5D4B8D3D6C9 E Global\MSI0000
                    2⤵
                    • Blocklisted process makes network request
                    • Drops file in System32 directory
                    • Modifies data under HKEY_USERS
                    PID:5584
                    • C:\Windows\SysWOW64\attrib.exe
                      "C:\Windows\SysWOW64\attrib.exe" +r "C:\program files (x86)\skype"
                      3⤵
                      • Views/modifies file attributes
                      PID:6004

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                Change Default File Association

                1
                T1042

                Registry Run Keys / Startup Folder

                4
                T1060

                Winlogon Helper DLL

                1
                T1004

                Bootkit

                1
                T1067

                Hidden Files and Directories

                1
                T1158

                Defense Evasion

                Modify Registry

                7
                T1112

                Install Root Certificate

                1
                T1130

                Hidden Files and Directories

                1
                T1158

                Credential Access

                Credentials in Files

                2
                T1081

                Discovery

                Query Registry

                5
                T1012

                System Information Discovery

                6
                T1082

                Security Software Discovery

                1
                T1063

                Peripheral Device Discovery

                2
                T1120

                Collection

                Data from Local System

                2
                T1005

                Impact

                Inhibit System Recovery

                1
                T1490

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Program Files (x86)\1672365003_0\360TS_Setup.exe
                  Filesize

                  92.8MB

                  MD5

                  4b78ca0f2616ea2062401e4aab555433

                  SHA1

                  c9b3c66e9198f0a8dc640c53dd08af346cc63027

                  SHA256

                  a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

                  SHA512

                  978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

                • C:\Program Files (x86)\1672365003_0\360TS_Setup.exe
                  Filesize

                  92.8MB

                  MD5

                  4b78ca0f2616ea2062401e4aab555433

                  SHA1

                  c9b3c66e9198f0a8dc640c53dd08af346cc63027

                  SHA256

                  a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

                  SHA512

                  978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

                • C:\Program Files (x86)\360\Total Security\360Base.dll
                  Filesize

                  965KB

                  MD5

                  4f241e5de9091f6d78469bf1dc141cbd

                  SHA1

                  dec02d084f94049a4087a0f23db063ecaf98269a

                  SHA256

                  b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

                  SHA512

                  2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

                • C:\Program Files (x86)\360\Total Security\360Base.dll
                  Filesize

                  965KB

                  MD5

                  4f241e5de9091f6d78469bf1dc141cbd

                  SHA1

                  dec02d084f94049a4087a0f23db063ecaf98269a

                  SHA256

                  b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

                  SHA512

                  2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

                • C:\Program Files (x86)\360\Total Security\360Base.dll
                  Filesize

                  965KB

                  MD5

                  4f241e5de9091f6d78469bf1dc141cbd

                  SHA1

                  dec02d084f94049a4087a0f23db063ecaf98269a

                  SHA256

                  b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

                  SHA512

                  2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

                • C:\Program Files (x86)\360\Total Security\360Base.dll
                  Filesize

                  965KB

                  MD5

                  4f241e5de9091f6d78469bf1dc141cbd

                  SHA1

                  dec02d084f94049a4087a0f23db063ecaf98269a

                  SHA256

                  b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

                  SHA512

                  2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

                • C:\Program Files (x86)\360\Total Security\360Base.dll
                  Filesize

                  965KB

                  MD5

                  4f241e5de9091f6d78469bf1dc141cbd

                  SHA1

                  dec02d084f94049a4087a0f23db063ecaf98269a

                  SHA256

                  b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

                  SHA512

                  2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

                • C:\Program Files (x86)\360\Total Security\360Base.dll
                  Filesize

                  965KB

                  MD5

                  4f241e5de9091f6d78469bf1dc141cbd

                  SHA1

                  dec02d084f94049a4087a0f23db063ecaf98269a

                  SHA256

                  b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

                  SHA512

                  2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

                • C:\Program Files (x86)\360\Total Security\360Base.dll
                  Filesize

                  965KB

                  MD5

                  4f241e5de9091f6d78469bf1dc141cbd

                  SHA1

                  dec02d084f94049a4087a0f23db063ecaf98269a

                  SHA256

                  b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

                  SHA512

                  2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

                • C:\Program Files (x86)\360\Total Security\360Base.dll
                  Filesize

                  965KB

                  MD5

                  4f241e5de9091f6d78469bf1dc141cbd

                  SHA1

                  dec02d084f94049a4087a0f23db063ecaf98269a

                  SHA256

                  b96a9539e9a77fc0d21131dad0df7b065d297de79010ea7a763618f670206659

                  SHA512

                  2cfb06650b6d4acc212ccb7dc1da0b55457a7dc8ea0c8f550c0b3794a2ceb41a50a4e4d2e8057878eca27d5d14ca7df36564c79ee3f3b6c5aac70ef08546ed3a

                • C:\Program Files (x86)\360\Total Security\360NetBase.dll
                  Filesize

                  1.4MB

                  MD5

                  14c6b4bbd31f6fd13530bc941cc71d1a

                  SHA1

                  ce4e38ac82a54f64d318507ddc28f9ffbb378f0f

                  SHA256

                  401d8529a84f1d80a439be8cd4e869202162458e5afb5e5bac97c4859bfe8eb5

                  SHA512

                  c16d525f1d3fc098b4d6c8b8a872a9013ef2f945f27af73ed7826f61a2b80d756ae5348105432909eccc71f03834cd1301f87fa5a0107e0c7137f5c8e3a3cc95

                • C:\Program Files (x86)\360\Total Security\360TSCommon.dll
                  Filesize

                  483KB

                  MD5

                  fd9ec3f6ae3ec4e72c7d8adb9d977480

                  SHA1

                  304b83eb514354a86c9b136ac32badcec616fed8

                  SHA256

                  deddae3c60a724e167107cda7d4ad0481d8ab451f61081eff7730d0f114da918

                  SHA512

                  22a47674c2000c175594e8b9f95d23665481a2f2c84f8870a4ad58095aa107b9a0ba61a5315ebdfcd1ec6a4b3031bb3e21ee6e2624d57daae20c587592cce5fd

                • C:\Program Files (x86)\360\Total Security\CrashReport.dll
                  Filesize

                  170KB

                  MD5

                  94a08d898c2029877e752203a477d22f

                  SHA1

                  d8a4c261b94319b4707ee201878658424e554f36

                  SHA256

                  07ed1d3443e7f9b2531aaa0b957a298ea6c5c81bcd321e7faf25a17a85063169

                  SHA512

                  79a2e121665e403767e5278bdbac6c52f6ce048d0c3968a2fb5053229c5d98e9275acbc48806c45b8bc2e807f6e52ee4dad54924b758db8328fb262c6fd176b6

                • C:\Program Files (x86)\360\Total Security\CrashReport.dll
                  Filesize

                  170KB

                  MD5

                  94a08d898c2029877e752203a477d22f

                  SHA1

                  d8a4c261b94319b4707ee201878658424e554f36

                  SHA256

                  07ed1d3443e7f9b2531aaa0b957a298ea6c5c81bcd321e7faf25a17a85063169

                  SHA512

                  79a2e121665e403767e5278bdbac6c52f6ce048d0c3968a2fb5053229c5d98e9275acbc48806c45b8bc2e807f6e52ee4dad54924b758db8328fb262c6fd176b6

                • C:\Program Files (x86)\360\Total Security\I18N.dll
                  Filesize

                  95KB

                  MD5

                  7e181b91215ae31b6717926501093bc4

                  SHA1

                  8fcf05c9ac64c46c87acc1ec67631e7b66363d9e

                  SHA256

                  239824a487ae786daadc9e556c185561378f47ec7ba6b216c17242aea3a78ff9

                  SHA512

                  0df684bdd9c0a5cce81db692e336dcf3e8c8aec80d5d6fb8620227e2f31d5bfd1d63f9cb7f808cb9511fe483e7798fa6d5a51c0bb1ec3c3c86400767a17a155f

                • C:\Program Files (x86)\360\Total Security\I18N.dll
                  Filesize

                  95KB

                  MD5

                  7e181b91215ae31b6717926501093bc4

                  SHA1

                  8fcf05c9ac64c46c87acc1ec67631e7b66363d9e

                  SHA256

                  239824a487ae786daadc9e556c185561378f47ec7ba6b216c17242aea3a78ff9

                  SHA512

                  0df684bdd9c0a5cce81db692e336dcf3e8c8aec80d5d6fb8620227e2f31d5bfd1d63f9cb7f808cb9511fe483e7798fa6d5a51c0bb1ec3c3c86400767a17a155f

                • C:\Program Files (x86)\360\Total Security\MenuEx64.dll
                  Filesize

                  388KB

                  MD5

                  d569954dc1054b6e7d3b495782634034

                  SHA1

                  dfaf57da05704261aa54afaa658d4e61a64fa7f2

                  SHA256

                  11294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80

                  SHA512

                  b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e

                • C:\Program Files (x86)\360\Total Security\MenuEx64.dll
                  Filesize

                  388KB

                  MD5

                  d569954dc1054b6e7d3b495782634034

                  SHA1

                  dfaf57da05704261aa54afaa658d4e61a64fa7f2

                  SHA256

                  11294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80

                  SHA512

                  b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e

                • C:\Program Files (x86)\360\Total Security\MenuEx64.dll
                  Filesize

                  388KB

                  MD5

                  d569954dc1054b6e7d3b495782634034

                  SHA1

                  dfaf57da05704261aa54afaa658d4e61a64fa7f2

                  SHA256

                  11294e063fe9a5d5b6019a39b48bebb75f536e27ff92008c85e9357c95805b80

                  SHA512

                  b12e2a6cfe849b5df21295f4a538db0381f2fb8c63b8b4dfca9778af16c68d23336140874a64deb324e39da0ac52b1f2292812fd02967d415319ade1ee965b6e

                • C:\Program Files (x86)\360\Total Security\QHVer.dll
                  Filesize

                  22KB

                  MD5

                  8338ded55a057f285dd476d0a65961d1

                  SHA1

                  40e80790eec0300a1bb3a90bc3dd3a058dcdb58d

                  SHA256

                  9f48f5b3d0086c61ec00a54d14bb48f55d118045a96c7f0e153ed187c2247202

                  SHA512

                  54073a45b5fcd4bfbe8e2b8d632eaeaa1669bd69ba3f728dff13f5a3cd20713eb3e96b16d8b45bac6ca9bcafbdbc727214824a165bbb4b43ea74e08a0ec817e1

                • C:\Program Files (x86)\360\Total Security\SoftMgr\EaInstHelper64.exe
                  Filesize

                  146KB

                  MD5

                  bebc39160a8446ec0e9693f5da3e8380

                  SHA1

                  9c4a2817429159eb4357ead9fca2d07d9d7c3f21

                  SHA256

                  ebe911d8eb2d2989becc8d9a965749e512914ff2bb42f1199e33c2550da46c56

                  SHA512

                  67281f868aae81017108dbfea58b882ec32eca3d6218e87d7ecf6df6df170ea62f94e041cbe09bb53d484af09acf72d6734110a4c6926cd0728029ccefdb5718

                • C:\Program Files (x86)\360\Total Security\Utils\PowerSaver.exe
                  Filesize

                  145KB

                  MD5

                  a99cc896f427963a7b7545a85a09b743

                  SHA1

                  360dec0169904782cfe871ba32d0ed3563c8fa62

                  SHA256

                  192b065887382e2755b2223b6a956ff1670b78d561012e0b1cbf862d90b46559

                  SHA512

                  5d745f0e9f10c24382948df7363424c6baa0dde6fb6a446bc6490bcfe4167d40acbfa1e2b1ebb0ca60595e59ad309def6ff3a4e8c8f23ac38fd6190f9b9a3285

                • C:\Program Files (x86)\360\Total Security\Utils\PowerSaver.exe
                  Filesize

                  145KB

                  MD5

                  a99cc896f427963a7b7545a85a09b743

                  SHA1

                  360dec0169904782cfe871ba32d0ed3563c8fa62

                  SHA256

                  192b065887382e2755b2223b6a956ff1670b78d561012e0b1cbf862d90b46559

                  SHA512

                  5d745f0e9f10c24382948df7363424c6baa0dde6fb6a446bc6490bcfe4167d40acbfa1e2b1ebb0ca60595e59ad309def6ff3a4e8c8f23ac38fd6190f9b9a3285

                • C:\Program Files (x86)\360\Total Security\config.ini
                  Filesize

                  146B

                  MD5

                  259b45ba3e50c2921cbe47da65d08651

                  SHA1

                  e694804d77e49bdf69943501fab96533e281b653

                  SHA256

                  6228e04578135ea2b289038dbb9cd3e854626ddcc77905c955783f505d67511c

                  SHA512

                  9d4cb718772dd4131ce937ed72a634cf06798b7f5363e93d711228aea01454fb6ae50071d79023897993d2891fa7f3654b781eafd15389fd53de88ab4c1bcab2

                • C:\Program Files (x86)\360\Total Security\deepscan\360FsFlt_win10.sys
                  Filesize

                  527KB

                  MD5

                  0e91072224732381b04b5b7001cce459

                  SHA1

                  5d1c1ed761d99d7356641672bc38e4efb74ecafc

                  SHA256

                  726a10a2f2e03bd5d85ba58d877606c42338245f7471aed88442dffd807605b1

                  SHA512

                  5f453a45d7a2ab3e10898ab6d17526864c6ee8217f0825092a5a5288089cd310e0a33eb93c1b828987f5977229bfe8e0f39180050a47b26b6c24624b4cb0957a

                • C:\Program Files (x86)\360\Total Security\deepscan\BAPI.dll
                  Filesize

                  247KB

                  MD5

                  c9dcd0eb8bc1ac4abb1e978de496d11a

                  SHA1

                  43ed0869766dc114ab05baa2095c907dea5a1827

                  SHA256

                  a173bd0c2bc2b1626c721da9530f3a1b2f2e3006383b533899a78edebab78c74

                  SHA512

                  151fe785153aef21b262347212cc035ba606ae86e24021ee436cded6b5746c4e0b7239664ee9aff5add0f2402a95f6035d9cd003b504c8e08554569b3659966a

                • C:\Program Files (x86)\360\Total Security\deepscan\qutmload.dll
                  Filesize

                  111KB

                  MD5

                  b2fd7b345d3683210a2a465a886ddb9e

                  SHA1

                  2aa774cbae5c9460945ffb850b990d3159c091f6

                  SHA256

                  eed8df7dc1f0e59b367cf49aa53c91f05953d0164f2d0900ab8ec738a413e5e1

                  SHA512

                  62e29140ae56b9aaa1872a070ef343e085802fc9dd46245456326a67288d452e81d986672ea30d232c9241011412af728672d6b6844b481037f448e8c180cf4c

                • C:\Program Files (x86)\360\Total Security\filemon\360AvFlt.dll
                  Filesize

                  53KB

                  MD5

                  da5e35c6395a34acaa5a0eb9b71ff85a

                  SHA1

                  5da7e723aaa5859ab8f227455d80d8afa7696e22

                  SHA256

                  5e11c25e4d6e146c5e10fcbc21b2cdb5e97ec47f25c416e5d263985f3d964172

                  SHA512

                  49660339594abff9b0590bc3f401634a514834cf98fa8715b05a57a3cea575d74859681984d8c2c601d5fe947701f8f110450fac764a5d32096e24d7eadcdd2c

                • C:\Program Files (x86)\360\Total Security\filemon\AVCheck.dll
                  Filesize

                  321KB

                  MD5

                  0fc2f13d9e0cfbd4903a77051348d16a

                  SHA1

                  c1df2fe56cbd15271020e48751c39ab482f6eaca

                  SHA256

                  7b79ca1ec9ea05d6549218af8c646f8cb25c563e66d810ca8890340066cff72b

                  SHA512

                  6977514116a2fa2c0a884b46975cfa048d966448e493c1415467d6be8719c6b40db0181a861f9e0ef53aa90a3b04012e02e6aecb70230745c487355170416efc

                • C:\Program Files (x86)\360\Total Security\i18n.dll
                  Filesize

                  95KB

                  MD5

                  7e181b91215ae31b6717926501093bc4

                  SHA1

                  8fcf05c9ac64c46c87acc1ec67631e7b66363d9e

                  SHA256

                  239824a487ae786daadc9e556c185561378f47ec7ba6b216c17242aea3a78ff9

                  SHA512

                  0df684bdd9c0a5cce81db692e336dcf3e8c8aec80d5d6fb8620227e2f31d5bfd1d63f9cb7f808cb9511fe483e7798fa6d5a51c0bb1ec3c3c86400767a17a155f

                • C:\Program Files (x86)\360\Total Security\i18n\en\UrlSettings.dll.locale
                  Filesize

                  22KB

                  MD5

                  627cbb9d1671cd7a553cb9e59e765bbf

                  SHA1

                  4a4916f14c4ca7d26dac88ff4a5884761d8c5a70

                  SHA256

                  063e660b1e32cbaefb8b928f1fa638853bbcb6b996bb08496fc861fc5425a840

                  SHA512

                  cfe0246353d9670ac7d77994633e8c55aca4a3ecc889c52d09949e427d5e5e06056678de15ecc3017af81ca6ca1333f624f8652a7488dd4e317c6a46c8719237

                • C:\Program Files (x86)\360\Total Security\i18n\en\safemon\360procmon.dll.locale
                  Filesize

                  106KB

                  MD5

                  7bdac7623fb140e69d7a572859a06457

                  SHA1

                  e094b2fe3418d43179a475e948a4712b63dec75b

                  SHA256

                  51475f2fa4cf26dfc0b6b27a42b324a109f95f33156618172544db97cbf4dddd

                  SHA512

                  fbed994a360ecff425728b1a465c14ffe056c9b227c2eb33f221e0614984fd21670eddb3681c20e31234a57bfe26bcf02c6a3b5e335d18610d09b4ed14aa5fb2

                • C:\Program Files (x86)\360\Total Security\i18n\i18n.ini
                  Filesize

                  246B

                  MD5

                  dfc82f7a034959dac18c530c1200b62c

                  SHA1

                  9dd98389b8fd252124d7eaba9909652a1c164302

                  SHA256

                  f421332fd132d8405cad34871425c9922e4a1b172d74f86b9e4e7ee750205919

                  SHA512

                  0acb2a043303ab1c033313d62b9b4dad8ca240e345195c87776f99f129a93946036835872b336a8efd996657c37acf56da7c01d68add340408e8fce72fc66fe5

                • C:\Program Files (x86)\360\Total Security\ipc\360Box.dll
                  Filesize

                  50KB

                  MD5

                  f398c9c333589ed57bb5a99eb2d32d13

                  SHA1

                  1fcac85e06506f332cae1d29451abe6808d8d39b

                  SHA256

                  1587d34c58ff2376384a0f3b279248d080724809eaf5f251cc2dda7896f04602

                  SHA512

                  0282f9ab1084fe093e097b6c33adfe2de59d4ed3a9eae12698df7295498ba56d4e8250a130af9f7284cd962691340246a15b3d32e9bf1df22ddd128f44d1205c

                • C:\Program Files (x86)\360\Total Security\ipc\360hvm.dll
                  Filesize

                  23KB

                  MD5

                  e540bc23b3f5934dee4d7b7b39fc3ac2

                  SHA1

                  465f0b0e4fe49b81a43980dd0cf40e068e98abed

                  SHA256

                  e794c636a50b5f51e0bd233c59c9144277a94792d3537460123a39c583d01421

                  SHA512

                  39412ddea1f7b16ae1b6d89db7f7c24b92b1b310f3d9191ab82bfa01283044d3c4e991a5fd4efee98d00c1e65d76328bd396138e5dfc90f44ed49ed605f8e764

                • C:\Program Files (x86)\360\Total Security\ipc\DrvUtility.dll
                  Filesize

                  171KB

                  MD5

                  bc8917f469a0e356c015ad6a31acc134

                  SHA1

                  a2e0fbcff53018ed92754065beb0a16e35339cf3

                  SHA256

                  4f798cf1e27dd355709c4ebe11a24b17ee832b4051f8952d9ae12942e0ccc5a9

                  SHA512

                  f9039ea609c18174dd76f5a89b6af4908573fe194cfaf412430c755da0626dce7b92f668e5cac6b195c91f17cc4eaf4ddb963b95bc6de7483c05436f7f4f59c8

                • C:\Program Files (x86)\360\Total Security\ipc\X64For32Lib.dll
                  Filesize

                  59KB

                  MD5

                  bdce31fc701c9aa16ca392a561ba102d

                  SHA1

                  58bbdeb96e7819b00d60f0e6580dfc455774a9f7

                  SHA256

                  3305ad2718c9bb9bd1db19cde17a184e0d7e497ff3930050c74875bc50f9690b

                  SHA512

                  2a16cc0a0bf718f661a3abe8f36b87c8b13716d5bdaa4c2768840734321f879de3d60255b67b2b858eabd627cf4302d7be0a29648bb65bedbfb5f838c9b96863

                • C:\Program Files (x86)\360\Total Security\ipc\sbmon.dll
                  Filesize

                  366KB

                  MD5

                  c0805da6b17d760418fd2fd031880934

                  SHA1

                  f9cf240f7bd4dbd31bc57913ab6517f0dc17d7a5

                  SHA256

                  edf443a3751d042fe16b8b11b484357a1b4702310bb50fb7aba9d68725803612

                  SHA512

                  f1c458ac3c1eb6ec67b4b0c54aaef09258e41ad4fbd3cd429da3bde278dba09c2419a79625aa39bb231ef277f803cf5ea568c82eaf028cd7a23a6a2fe74306ae

                • C:\Program Files (x86)\360\Total Security\netmon\360netctrl.dll
                  Filesize

                  382KB

                  MD5

                  30c9d5470142edf4d69b00aff040f822

                  SHA1

                  7c21ed33749b58c10ad7e1d95c922244eec62fcf

                  SHA256

                  b76103ff3d6faa46537d3db213270a086ae3b5b58fe6841b03cd5f9f73c54247

                  SHA512

                  c385b70414823107903fc1eec608b064360337114dc8a6d307f2caad9ec5ec7e53a2850f26b5374deaa97b2c727206f08a0a2037d12550e6449632d165b03b7f

                • C:\Program Files (x86)\360\Total Security\netmon\netmstart.dll
                  Filesize

                  169KB

                  MD5

                  b1f70f9be9df8bb186c5bc5159690a1f

                  SHA1

                  0c9347ac3245cdeb8dcea9b3edf01fe4cfd33fe2

                  SHA256

                  ce993f7583b1f253c6d82027b89fd867390ea1563564da75684d293539edc6a2

                  SHA512

                  188419d1cbc4f1b1bec99bf77f716bb004a0228d3d36eca9d2e479735efae8970dff62f5df42f01e8174173537f0d68ae37b9d5b70b0698b52f50ee0aacc5231

                • C:\Program Files (x86)\360\Total Security\safemon\360HipsPopWnd.dll
                  Filesize

                  790KB

                  MD5

                  c77481cac4c9411aa1ead1de68c7798d

                  SHA1

                  f2288af2ee58e25de2a11da09589bb61e94ae5cb

                  SHA256

                  eb04cc2139f21f62107afaf03939c49515730cce4ed0f0e6d12199445b5f377a

                  SHA512

                  bbde3700933d5264ec024f866dc1c6b5d7e51d6368f3614aa95fbbe93fb9ee593e87f61e7f945d141d883d4d2a07c22114bb98e262f2afbccc7ec485cffde3cc

                • C:\Program Files (x86)\360\Total Security\safemon\360SPTool.exe
                  Filesize

                  165KB

                  MD5

                  259affe7b271b29d4b04d678c94bc776

                  SHA1

                  073f326b4ce111ace97df011f8ffb78bbefcdbd2

                  SHA256

                  92d35442715cb9c7dee115e146daa72bbb5c408ae03bb6bb5b6f834ff1867444

                  SHA512

                  e042c2ecb0f2f53a2d1555799d30aff474dfeea01033761f7f9298fa5575f5c23db5819bd850209c1b916ba3d7bd8f32a31c8b81ab9ac65a0d0a27be353aeb63

                • C:\Program Files (x86)\360\Total Security\safemon\360procmon.dll
                  Filesize

                  470KB

                  MD5

                  83f8ed9de87847a744d5c9886497c35a

                  SHA1

                  ebd215ec6eff04b395f4ddffa77b5f06d43d2e74

                  SHA256

                  0f9b89a1d321941fe5c9e714aa4590dacf6e88f4014c2ae69e394cb4f3e5640b

                  SHA512

                  c110aa4504e6978f365fdcbbc933fcf6be9b8b74403e4901b3801658bd8b540c830a3a579a7eab3865cc5c12e3545e807d3257d4ef36be00e6da5077b8f5c4e1

                • C:\Program Files (x86)\360\Total Security\safemon\360procmon.dll
                  Filesize

                  470KB

                  MD5

                  83f8ed9de87847a744d5c9886497c35a

                  SHA1

                  ebd215ec6eff04b395f4ddffa77b5f06d43d2e74

                  SHA256

                  0f9b89a1d321941fe5c9e714aa4590dacf6e88f4014c2ae69e394cb4f3e5640b

                  SHA512

                  c110aa4504e6978f365fdcbbc933fcf6be9b8b74403e4901b3801658bd8b540c830a3a579a7eab3865cc5c12e3545e807d3257d4ef36be00e6da5077b8f5c4e1

                • C:\Program Files (x86)\360\Total Security\safemon\360procmon.dll
                  Filesize

                  470KB

                  MD5

                  83f8ed9de87847a744d5c9886497c35a

                  SHA1

                  ebd215ec6eff04b395f4ddffa77b5f06d43d2e74

                  SHA256

                  0f9b89a1d321941fe5c9e714aa4590dacf6e88f4014c2ae69e394cb4f3e5640b

                  SHA512

                  c110aa4504e6978f365fdcbbc933fcf6be9b8b74403e4901b3801658bd8b540c830a3a579a7eab3865cc5c12e3545e807d3257d4ef36be00e6da5077b8f5c4e1

                • C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe
                  Filesize

                  1.1MB

                  MD5

                  7e0bce805d94db8b88971a0fe03ec52e

                  SHA1

                  f4ce366ed9958d1f25426e5914b6806aa9790a33

                  SHA256

                  e4c4fcf88132c1970ccb9ec8f43dc7d1ee193ad552ccdef8ab166959a25696c2

                  SHA512

                  d631b6d22b057fc6f385a701eb9c8895fd59d692fbf14f6f87242837b1c9df745493fe35adebeee4c2099ac544800f9fd205d4e76dd2bbd85b601de80854908b

                • C:\Program Files (x86)\360\Total Security\safemon\QHActiveDefense.exe
                  Filesize

                  1.1MB

                  MD5

                  7e0bce805d94db8b88971a0fe03ec52e

                  SHA1

                  f4ce366ed9958d1f25426e5914b6806aa9790a33

                  SHA256

                  e4c4fcf88132c1970ccb9ec8f43dc7d1ee193ad552ccdef8ab166959a25696c2

                  SHA512

                  d631b6d22b057fc6f385a701eb9c8895fd59d692fbf14f6f87242837b1c9df745493fe35adebeee4c2099ac544800f9fd205d4e76dd2bbd85b601de80854908b

                • C:\Program Files (x86)\360\Total Security\safemon\WscReg.exe
                  Filesize

                  2.9MB

                  MD5

                  c7dbfd0d17929c83f12080eb4680595f

                  SHA1

                  210f608a7929bf4085815522ffe2695063125e69

                  SHA256

                  a628b37df526093026862a1180484beece436b5dfba83648551fe57ce9a5dd75

                  SHA512

                  7d8d5b387cf65920e7a1f2aa7c0ce111eb5d600fe69ec48c66f3bf05c870dad0e34d9637b1852af0f379495bc3ebc277d130d14701e2b4114f8d50bab057c5f3

                • C:\Program Files (x86)\360\Total Security\safemon\WscReg.exe
                  Filesize

                  2.9MB

                  MD5

                  c7dbfd0d17929c83f12080eb4680595f

                  SHA1

                  210f608a7929bf4085815522ffe2695063125e69

                  SHA256

                  a628b37df526093026862a1180484beece436b5dfba83648551fe57ce9a5dd75

                  SHA512

                  7d8d5b387cf65920e7a1f2aa7c0ce111eb5d600fe69ec48c66f3bf05c870dad0e34d9637b1852af0f379495bc3ebc277d130d14701e2b4114f8d50bab057c5f3

                • C:\Program Files (x86)\360\Total Security\safemon\WscReg.exe
                  Filesize

                  2.9MB

                  MD5

                  c7dbfd0d17929c83f12080eb4680595f

                  SHA1

                  210f608a7929bf4085815522ffe2695063125e69

                  SHA256

                  a628b37df526093026862a1180484beece436b5dfba83648551fe57ce9a5dd75

                  SHA512

                  7d8d5b387cf65920e7a1f2aa7c0ce111eb5d600fe69ec48c66f3bf05c870dad0e34d9637b1852af0f379495bc3ebc277d130d14701e2b4114f8d50bab057c5f3

                • C:\Program Files (x86)\360\Total Security\softmgr\360elam64.sys
                  Filesize

                  16KB

                  MD5

                  67e72ee5dcd6e2c69d9c1f457fd0e3c9

                  SHA1

                  1da65ca2fd47f10ec7eac55fdb5bfce19bb90de3

                  SHA256

                  7f3f8cde5989c7339f4862dd44ecd827fbf06d0ae6152c17907e27e822e0bf82

                  SHA512

                  d715cc1761a025e0df4296a4c37c4e799c6006dce6bf63215f9864cf853cc5f7917fd24baa1cac775e8b74005eebb6fc42b211876bf386af0062364c6ee2fd77

                • C:\Program Files (x86)\360\Total Security\softmgr\EaInstHelper64.exe
                  Filesize

                  146KB

                  MD5

                  bebc39160a8446ec0e9693f5da3e8380

                  SHA1

                  9c4a2817429159eb4357ead9fca2d07d9d7c3f21

                  SHA256

                  ebe911d8eb2d2989becc8d9a965749e512914ff2bb42f1199e33c2550da46c56

                  SHA512

                  67281f868aae81017108dbfea58b882ec32eca3d6218e87d7ecf6df6df170ea62f94e041cbe09bb53d484af09acf72d6734110a4c6926cd0728029ccefdb5718

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8
                  Filesize

                  2KB

                  MD5

                  f7d1d25a4bb9539426866bd092721c19

                  SHA1

                  5c2bf9edfdae783797538617e6b453f984d37167

                  SHA256

                  73783350d643231a95bd81354713994eeb2ebd3cc6e80733922f2ff7e232fd37

                  SHA512

                  55b08279b76e264847c53396e22c71cea9a8296fe38948fc6f2a44c2af4a3101f072d8038c8a45e934f0000c102dda5ad6c09a4d5d80a4b6f61277aeb8ee61a4

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                  Filesize

                  1KB

                  MD5

                  a2b3de2676790ac64a1bc51ba3e667d1

                  SHA1

                  2a7f7090fed2ddd299339197428a9fafc3fd349b

                  SHA256

                  aa8cdcc9c8c19d24037aa62dfb529b22d25a7eb3927d35f59572c153c81c5a4a

                  SHA512

                  ab9e80a077a2fe486630e4d7fb159994224fce41c6fbc6197cc600e4fac86d504e8b3d1670ca628fb45792498be42a80e1c6b0af4b3e7451bc039222ea123ef5

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_90887DD7920637A743EF36CB9A88B5D8
                  Filesize

                  488B

                  MD5

                  b18d5effe8f626bda1a932cd6a712cb0

                  SHA1

                  20fd0504e4d3f8ba9c05fd3eb4c2cb26187df651

                  SHA256

                  0d6c186b346da805a366778f1887dab1546d7b525040c058c796808e9cc61ab0

                  SHA512

                  994dcaba79bf4da90984ef8744bec67d1d4314e6c601d848116c42e00fb44b0b5714faf7f77347746d6c6ab1a45db4b5e9f22bb90de1750943218efd2b917ea9

                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
                  Filesize

                  482B

                  MD5

                  d1f2cab0c3855401dd723e00fc929fa1

                  SHA1

                  6b8050d97a6fc5302beddf4a55b11c04fcb068dc

                  SHA256

                  3a7f308430576b15a7d39e6b6e15626ad19a94df0d2775cb4b4dd0b786b1035d

                  SHA512

                  e3238ab8b4965ef184b766da040cb49c92e242612c3e3a1ab5d1709f79a147add21ef9c2269ce8905916b9d37537effe34effffce3f2badbc9e345d5c93855ee

                • C:\Users\Admin\AppData\Local\Temp\1672364999_00000000_base\360base.dll
                  Filesize

                  884KB

                  MD5

                  8c42fc725106cf8276e625b4f97861bc

                  SHA1

                  9c4140730cb031c29fc63e17e1504693d0f21c13

                  SHA256

                  d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

                  SHA512

                  f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

                • C:\Users\Admin\AppData\Local\Temp\1672365023_00000000_base\360base.dll
                  Filesize

                  884KB

                  MD5

                  8c42fc725106cf8276e625b4f97861bc

                  SHA1

                  9c4140730cb031c29fc63e17e1504693d0f21c13

                  SHA256

                  d1ca92aa0789ee87d45f9f3c63e0e46ad2997b09605cbc2c57da2be6b8488c22

                  SHA512

                  f3c33dfe8e482692d068bf2185bec7d0d2bb232e6828b0bc8dc867da9e7ca89f9356fde87244fe686e3830f957c052089a87ecff4e44842a1a7848246f0ba105

                • C:\Users\Admin\AppData\Local\Temp\1672365048_00000000_wscreg\WscReg.exe
                  Filesize

                  2.9MB

                  MD5

                  c7dbfd0d17929c83f12080eb4680595f

                  SHA1

                  210f608a7929bf4085815522ffe2695063125e69

                  SHA256

                  a628b37df526093026862a1180484beece436b5dfba83648551fe57ce9a5dd75

                  SHA512

                  7d8d5b387cf65920e7a1f2aa7c0ce111eb5d600fe69ec48c66f3bf05c870dad0e34d9637b1852af0f379495bc3ebc277d130d14701e2b4114f8d50bab057c5f3

                • C:\Users\Admin\AppData\Local\Temp\1672365048_00000000_wscreg\WscReg.exe
                  Filesize

                  2.9MB

                  MD5

                  c7dbfd0d17929c83f12080eb4680595f

                  SHA1

                  210f608a7929bf4085815522ffe2695063125e69

                  SHA256

                  a628b37df526093026862a1180484beece436b5dfba83648551fe57ce9a5dd75

                  SHA512

                  7d8d5b387cf65920e7a1f2aa7c0ce111eb5d600fe69ec48c66f3bf05c870dad0e34d9637b1852af0f379495bc3ebc277d130d14701e2b4114f8d50bab057c5f3

                • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe
                  Filesize

                  92.8MB

                  MD5

                  4b78ca0f2616ea2062401e4aab555433

                  SHA1

                  c9b3c66e9198f0a8dc640c53dd08af346cc63027

                  SHA256

                  a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

                  SHA512

                  978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

                • C:\Users\Admin\AppData\Local\Temp\360TS_Setup.exe
                  Filesize

                  92.8MB

                  MD5

                  4b78ca0f2616ea2062401e4aab555433

                  SHA1

                  c9b3c66e9198f0a8dc640c53dd08af346cc63027

                  SHA256

                  a9e1b9bc84f9d7f1a9de4a81865dc9bb21a8ef3d1a799c19627dd203aae9585f

                  SHA512

                  978f4f8f31e3480c30b2ffb4d1453c8bc3f2b4242b364eecba85c86a711c14b689378d35d80ed25f8ac2203f0c1da83f77252513f5c3e35a83d33c3e54af0fa1

                • C:\Users\Admin\AppData\Local\Temp\360_install_20221230015024_240651187\7z.dll
                  Filesize

                  1.1MB

                  MD5

                  e74067bfda81cd82fe3a5fc2fdb87e2b

                  SHA1

                  de961204751d9af1bab9c2a9ba16edc7a4ae7388

                  SHA256

                  898bf5db34d9997b3d90b87091f34ae4e3e9cf34b6f2ae7fb8fd86e8a1bb684e

                  SHA512

                  c0b1d851d97df2635b865d7f0a252881eef622363e08190e1f45ec308fdbd81f94ece53a6c2b1b36c38fcb82c2b8262f31a936a399cee567631b9146cf3ef60a

                • C:\Users\Admin\AppData\Local\Temp\{5357B8C2-431E-46de-B7C8-5C7D078DCD0E}.tmp\360P2SP.dll
                  Filesize

                  824KB

                  MD5

                  fc1796add9491ee757e74e65cedd6ae7

                  SHA1

                  603e87ab8cb45f62ecc7a9ef52d5dedd261ea812

                  SHA256

                  bf1b96f5b56be51e24d6314bc7ec25f1bdba2435f4dfc5be87de164fe5de9e60

                  SHA512

                  8fa2e4ff5cbc05034051261c778fec1f998ceb2d5e8dea16b26b91056a989fdc58f33767687b393f32a5aff7c2b8d6df300b386f608abd0ad193068aa9251e0d

                • memory/384-244-0x0000000000000000-mapping.dmp
                • memory/400-280-0x0000000000010000-0x000000000012E000-memory.dmp
                  Filesize

                  1.1MB

                • memory/400-300-0x0000000000200000-0x000000000022B000-memory.dmp
                  Filesize

                  172KB

                • memory/400-326-0x000000000D330000-0x000000000D342000-memory.dmp
                  Filesize

                  72KB

                • memory/400-325-0x0000000000470000-0x000000000049A000-memory.dmp
                  Filesize

                  168KB

                • memory/400-324-0x0000000000470000-0x000000000049A000-memory.dmp
                  Filesize

                  168KB

                • memory/400-323-0x0000000000470000-0x0000000000498000-memory.dmp
                  Filesize

                  160KB

                • memory/400-322-0x0000000000040000-0x0000000000053000-memory.dmp
                  Filesize

                  76KB

                • memory/400-321-0x0000000000040000-0x0000000000053000-memory.dmp
                  Filesize

                  76KB

                • memory/400-319-0x000000000D330000-0x000000000D347000-memory.dmp
                  Filesize

                  92KB

                • memory/400-320-0x0000000000410000-0x00000000004FF000-memory.dmp
                  Filesize

                  956KB

                • memory/400-317-0x0000000000470000-0x0000000000498000-memory.dmp
                  Filesize

                  160KB

                • memory/400-316-0x0000000000410000-0x00000000004FF000-memory.dmp
                  Filesize

                  956KB

                • memory/400-272-0x000000000D330000-0x000000000D397000-memory.dmp
                  Filesize

                  412KB

                • memory/400-315-0x0000000000010000-0x000000000012E000-memory.dmp
                  Filesize

                  1.1MB

                • memory/400-314-0x000000000D330000-0x000000000D352000-memory.dmp
                  Filesize

                  136KB

                • memory/400-274-0x000000000D330000-0x000000000D33A000-memory.dmp
                  Filesize

                  40KB

                • memory/400-313-0x000000000D330000-0x000000000D352000-memory.dmp
                  Filesize

                  136KB

                • memory/400-312-0x000000000D330000-0x000000000D33D000-memory.dmp
                  Filesize

                  52KB

                • memory/400-311-0x000000000D330000-0x000000000D33D000-memory.dmp
                  Filesize

                  52KB

                • memory/400-310-0x000000000D330000-0x000000000D343000-memory.dmp
                  Filesize

                  76KB

                • memory/400-309-0x000000000D330000-0x000000000D343000-memory.dmp
                  Filesize

                  76KB

                • memory/400-308-0x000000000D330000-0x000000000D347000-memory.dmp
                  Filesize

                  92KB

                • memory/400-307-0x0000000000010000-0x000000000012E000-memory.dmp
                  Filesize

                  1.1MB

                • memory/400-306-0x000000000D330000-0x000000000D33A000-memory.dmp
                  Filesize

                  40KB

                • memory/400-305-0x000000000D330000-0x000000000D397000-memory.dmp
                  Filesize

                  412KB

                • memory/400-304-0x000000000D330000-0x000000000D397000-memory.dmp
                  Filesize

                  412KB

                • memory/400-303-0x000000000D330000-0x000000000D37E000-memory.dmp
                  Filesize

                  312KB

                • memory/400-302-0x000000000D330000-0x000000000D37E000-memory.dmp
                  Filesize

                  312KB

                • memory/400-301-0x0000000000200000-0x000000000022B000-memory.dmp
                  Filesize

                  172KB

                • memory/400-265-0x000000006BCC0000-0x000000006BD4E000-memory.dmp
                  Filesize

                  568KB

                • memory/400-299-0x000000000D330000-0x000000000D33B000-memory.dmp
                  Filesize

                  44KB

                • memory/400-297-0x000000000D330000-0x000000000D33B000-memory.dmp
                  Filesize

                  44KB

                • memory/400-296-0x0000000000010000-0x0000000000028000-memory.dmp
                  Filesize

                  96KB

                • memory/400-293-0x0000000000010000-0x000000000001E000-memory.dmp
                  Filesize

                  56KB

                • memory/400-295-0x0000000000010000-0x0000000000028000-memory.dmp
                  Filesize

                  96KB

                • memory/400-294-0x0000000000010000-0x000000000001E000-memory.dmp
                  Filesize

                  56KB

                • memory/400-292-0x000000000D330000-0x000000000D342000-memory.dmp
                  Filesize

                  72KB

                • memory/400-291-0x000000000D330000-0x000000000D342000-memory.dmp
                  Filesize

                  72KB

                • memory/400-290-0x0000000000470000-0x000000000049A000-memory.dmp
                  Filesize

                  168KB

                • memory/400-289-0x0000000000470000-0x000000000049A000-memory.dmp
                  Filesize

                  168KB

                • memory/400-288-0x0000000000470000-0x0000000000498000-memory.dmp
                  Filesize

                  160KB

                • memory/400-287-0x0000000000470000-0x0000000000498000-memory.dmp
                  Filesize

                  160KB

                • memory/400-286-0x0000000000040000-0x0000000000053000-memory.dmp
                  Filesize

                  76KB

                • memory/400-285-0x0000000000410000-0x00000000004FF000-memory.dmp
                  Filesize

                  956KB

                • memory/400-284-0x000000000D330000-0x000000000D347000-memory.dmp
                  Filesize

                  92KB

                • memory/400-283-0x0000000000410000-0x00000000004FF000-memory.dmp
                  Filesize

                  956KB

                • memory/400-282-0x000000000D330000-0x000000000D347000-memory.dmp
                  Filesize

                  92KB

                • memory/400-281-0x0000000000010000-0x000000000012E000-memory.dmp
                  Filesize

                  1.1MB

                • memory/400-279-0x000000000D330000-0x000000000D352000-memory.dmp
                  Filesize

                  136KB

                • memory/400-278-0x000000000D330000-0x000000000D33D000-memory.dmp
                  Filesize

                  52KB

                • memory/400-254-0x000000006BCC0000-0x000000006BD4E000-memory.dmp
                  Filesize

                  568KB

                • memory/400-277-0x000000000D330000-0x000000000D33D000-memory.dmp
                  Filesize

                  52KB

                • memory/400-276-0x000000000D330000-0x000000000D343000-memory.dmp
                  Filesize

                  76KB

                • memory/400-275-0x000000000D330000-0x000000000D343000-memory.dmp
                  Filesize

                  76KB

                • memory/400-273-0x000000000D330000-0x000000000D397000-memory.dmp
                  Filesize

                  412KB

                • memory/444-209-0x0000000000000000-mapping.dmp
                • memory/480-212-0x0000000000000000-mapping.dmp
                • memory/548-266-0x0000000000000000-mapping.dmp
                • memory/632-219-0x00000000049F0000-0x0000000004A00000-memory.dmp
                  Filesize

                  64KB

                • memory/632-217-0x00000000049E0000-0x00000000049F0000-memory.dmp
                  Filesize

                  64KB

                • memory/632-231-0x0000000004A00000-0x0000000004A10000-memory.dmp
                  Filesize

                  64KB

                • memory/632-216-0x0000000000000000-mapping.dmp
                • memory/632-220-0x00000000049E0000-0x00000000049F0000-memory.dmp
                  Filesize

                  64KB

                • memory/632-222-0x0000000004A00000-0x0000000004A10000-memory.dmp
                  Filesize

                  64KB

                • memory/660-234-0x0000000000000000-mapping.dmp
                • memory/868-213-0x0000000000000000-mapping.dmp
                • memory/1256-224-0x0000000000000000-mapping.dmp
                • memory/1268-261-0x0000000000000000-mapping.dmp
                • memory/1344-179-0x0000000000000000-mapping.dmp
                • memory/1376-229-0x0000000000000000-mapping.dmp
                • memory/1448-250-0x0000000000000000-mapping.dmp
                • memory/1652-260-0x0000000000000000-mapping.dmp
                • memory/1656-223-0x0000000000000000-mapping.dmp
                • memory/1728-242-0x0000000000000000-mapping.dmp
                • memory/1752-233-0x0000000000000000-mapping.dmp
                • memory/1836-245-0x0000000000000000-mapping.dmp
                • memory/1900-227-0x0000000000000000-mapping.dmp
                • memory/1984-221-0x0000000000000000-mapping.dmp
                • memory/2188-211-0x0000000000000000-mapping.dmp
                • memory/2264-215-0x0000000000000000-mapping.dmp
                • memory/2380-247-0x0000000000000000-mapping.dmp
                • memory/2564-207-0x0000000000000000-mapping.dmp
                • memory/2588-208-0x0000000000000000-mapping.dmp
                • memory/2596-152-0x0000000000000000-mapping.dmp
                • memory/2740-246-0x0000000000000000-mapping.dmp
                • memory/3108-188-0x0000000000000000-mapping.dmp
                • memory/3136-248-0x0000000000000000-mapping.dmp
                • memory/3332-145-0x0000000000000000-mapping.dmp
                • memory/3356-226-0x0000000000000000-mapping.dmp
                • memory/3504-243-0x0000000000000000-mapping.dmp
                • memory/3504-185-0x0000000000000000-mapping.dmp
                • memory/3572-256-0x0000000000000000-mapping.dmp
                • memory/3608-249-0x0000000000000000-mapping.dmp
                • memory/3716-228-0x0000000000000000-mapping.dmp
                • memory/3844-257-0x0000000000000000-mapping.dmp
                • memory/3896-225-0x0000000000000000-mapping.dmp
                • memory/4024-251-0x000000006BCC0000-0x000000006BD4E000-memory.dmp
                  Filesize

                  568KB

                • memory/4024-230-0x0000000000000000-mapping.dmp
                • memory/4024-264-0x000000006BCC0000-0x000000006BD4E000-memory.dmp
                  Filesize

                  568KB

                • memory/4024-252-0x000000006BCC0000-0x000000006BD4E000-memory.dmp
                  Filesize

                  568KB

                • memory/4056-133-0x0000000000000000-mapping.dmp
                • memory/4092-172-0x0000000000000000-mapping.dmp
                • memory/4296-232-0x0000000000000000-mapping.dmp
                • memory/4408-174-0x0000000000000000-mapping.dmp
                • memory/4480-270-0x0000000000400000-0x00000000030CA000-memory.dmp
                  Filesize

                  44.8MB

                • memory/4480-267-0x0000000000000000-mapping.dmp
                • memory/4480-268-0x0000000000400000-0x00000000030CA000-memory.dmp
                  Filesize

                  44.8MB

                • memory/4700-218-0x0000000000000000-mapping.dmp
                • memory/4720-169-0x0000000000000000-mapping.dmp
                • memory/4732-235-0x0000000000000000-mapping.dmp
                • memory/4732-153-0x0000000000000000-mapping.dmp
                • memory/4808-262-0x0000000000000000-mapping.dmp
                • memory/4928-214-0x0000000000000000-mapping.dmp
                • memory/4964-263-0x0000000000000000-mapping.dmp
                • memory/5028-210-0x0000000000000000-mapping.dmp
                • memory/5032-259-0x0000000000000000-mapping.dmp
                • memory/5040-255-0x0000000000000000-mapping.dmp
                • memory/5064-258-0x0000000000000000-mapping.dmp
                • memory/5108-137-0x0000000000000000-mapping.dmp
                • memory/5316-269-0x0000000000000000-mapping.dmp
                • memory/5412-271-0x0000000000000000-mapping.dmp
                • memory/5584-298-0x0000000000000000-mapping.dmp
                • memory/6004-318-0x0000000000000000-mapping.dmp
                • memory/6012-350-0x0000000000000000-mapping.dmp