Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    166s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    24/12/2023, 20:11

General

  • Target

    1008510c01ae812ac9411c6f1abca788.exe

  • Size

    127KB

  • MD5

    1008510c01ae812ac9411c6f1abca788

  • SHA1

    a3009e0c6ee1027f7e8a89fa642508ee8a63a5d9

  • SHA256

    98b8c0b46fcd24848cd9c82d48de824ba399297fe67d1b5facaf2d1c8d6a057c

  • SHA512

    a1f885afb95626389132e5f0c7f6068abd50623898d43d2368d3c5d01ee93595c37e5833f828341ad316153bfac577d8a949e3e25926ed7b9a6459e073733a5a

  • SSDEEP

    1536:7amlu3hbBGy3G8nhMpD7MUYU6U5jUdPQc+n35KZg8/nouy8Iu:7reMPd/MYjUtQl78vout

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 8 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • UAC bypass 3 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 8 IoCs
  • Adds Run key to start application 2 TTPs 31 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 34 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 12 IoCs
  • Modifies registry class 48 IoCs
  • Runs ping.exe 1 TTPs 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1008510c01ae812ac9411c6f1abca788.exe
    "C:\Users\Admin\AppData\Local\Temp\1008510c01ae812ac9411c6f1abca788.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\1008510c01ae812ac9411c6f1abca788.exe 
      C:\Users\Admin\AppData\Local\Temp\1008510c01ae812ac9411c6f1abca788.exe 
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2736
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1704
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2732
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
        3⤵
        • Suspicious use of FindShellTrayWindow
        PID:560
      • C:\Windows\SysWOW64\ping.exe
        ping www.rasasayang.com.my -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:1164
      • C:\Windows\SysWOW64\ping.exe
        ping www.data0.net -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:2776
      • C:\Windows\SysWOW64\ping.exe
        ping www.duniasex.com -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:2040
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        3⤵
        • Drops file in System32 directory
        PID:1532
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1636
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:2556
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:2576
  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
    C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
      C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1124
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:2820
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2752
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:2772
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1792
      • C:\Windows\SysWOW64\ping.exe
        ping www.rasasayang.com.my -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:2304
      • C:\Windows\SysWOW64\ping.exe
        ping www.data0.net -n 65500 -l 1340
        3⤵
        • Runs ping.exe
        PID:2204
      • C:\Windows\SysWOW64\ping.exe
        ping www.duniasex.com -n 65500 -l 1340
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Runs ping.exe
        • Suspicious use of SetWindowsHookEx
        PID:2940
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
        3⤵
        • Suspicious use of FindShellTrayWindow
        PID:2688
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        3⤵
        • Executes dropped EXE
        PID:1084
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:268
  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
    C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:1932
  • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\uxnw.exe
    "c:\Documents and Settings\Admin\Application Data\Microsoft\uxnw.exe" csrss
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Executes dropped EXE
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1152
  • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
    C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • UAC bypass
    • Disables RegEdit via registry modification
    • Sets file execution options in registry
    • Executes dropped EXE
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Drops file in System32 directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1180
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
      C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2892
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
      C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
      2⤵
        PID:1192
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2528
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:2748
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2616
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
        2⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:1628
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1048
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2072
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1192
      • C:\Windows\SysWOW64\ping.exe
        ping www.rasasayang.com.my -n 65500 -l 1340
        2⤵
        • Runs ping.exe
        PID:2196
      • C:\Windows\SysWOW64\ping.exe
        ping www.data0.net -n 65500 -l 1340
        2⤵
        • Runs ping.exe
        PID:1868
      • C:\Windows\SysWOW64\ping.exe
        ping www.duniasex.com -n 65500 -l 1340
        2⤵
        • Runs ping.exe
        PID:1224
    • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
      C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
      1⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • UAC bypass
      • Disables RegEdit via registry modification
      • Sets file execution options in registry
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1520
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1604
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1800
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of SetWindowsHookEx
        PID:1044
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1528
      • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
        C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:1524
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
          3⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Sets file execution options in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Modifies system executable filetype association
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:2440
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
            4⤵
              PID:1612
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
                C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2120
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
              4⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Suspicious use of SetWindowsHookEx
              PID:1980
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
                C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:896
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
              4⤵
                PID:2940
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2208
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1568
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:552
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
                C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2724
              • C:\Windows\SysWOW64\ping.exe
                ping www.duniasex.com -n 65500 -l 1340
                4⤵
                • Runs ping.exe
                PID:2312
              • C:\Windows\SysWOW64\ping.exe
                ping www.rasasayang.com.my -n 65500 -l 1340
                4⤵
                • Runs ping.exe
                PID:1640
              • C:\Windows\SysWOW64\ping.exe
                ping www.data0.net -n 65500 -l 1340
                4⤵
                • Runs ping.exe
                PID:2388
              • C:\Windows\SysWOW64\rundll32.exe
                rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
                4⤵
                • Suspicious use of FindShellTrayWindow
                PID:2012
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2116
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2824
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2640
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:1080
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
            2⤵
            • Suspicious use of FindShellTrayWindow
            PID:1924
          • C:\Windows\SysWOW64\ping.exe
            ping www.data0.net -n 65500 -l 1340
            2⤵
            • Runs ping.exe
            PID:832
          • C:\Windows\SysWOW64\ping.exe
            ping www.rasasayang.com.my -n 65500 -l 1340
            2⤵
            • Runs ping.exe
            PID:1632
          • C:\Windows\SysWOW64\ping.exe
            ping www.duniasex.com -n 65500 -l 1340
            2⤵
            • Runs ping.exe
            PID:544
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
          1⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1712
        • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
          C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
          1⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • UAC bypass
          • Disables RegEdit via registry modification
          • Sets file execution options in registry
          • Executes dropped EXE
          • Modifies system executable filetype association
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Drops file in System32 directory
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:984
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
            2⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of SetWindowsHookEx
            PID:2560
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2060
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2392
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\lsass.exe
            2⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2604
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:3016
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\services.exe
            2⤵
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious use of SetWindowsHookEx
            PID:568
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2480
          • C:\Windows\SysWOW64\ping.exe
            ping www.rasasayang.com.my -n 65500 -l 1340
            2⤵
            • Runs ping.exe
            PID:992
          • C:\Windows\SysWOW64\ping.exe
            ping www.data0.net -n 65500 -l 1340
            2⤵
            • Runs ping.exe
            PID:2944
          • C:\Windows\SysWOW64\ping.exe
            ping www.duniasex.com -n 65500 -l 1340
            2⤵
            • Runs ping.exe
            PID:2700
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\Windows\System32\shimgvw.dll, ImageView_Fullscreen
            2⤵
            • Suspicious use of FindShellTrayWindow
            PID:1132
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
            C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community
            2⤵
              PID:2908
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\winlogon.exe
              2⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2328
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
            C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2412
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
            C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2340
          • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
            C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe 
            1⤵
              PID:1732
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\smss.exe
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in System32 directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1816
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe
              C:\Windows\System32\~A~m~B~u~R~a~D~u~L~\csrss.exe
              1⤵
              • Modifies visibility of file extensions in Explorer
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies system executable filetype association
              • Drops file in System32 directory
              • Modifies registry class
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2652
            • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
              C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\smss.exe 
              1⤵
                PID:2180
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
                C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:980
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
                C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1732
              • C:\Windows\system32\conhost.exe
                \??\C:\Windows\system32\conhost.exe "-1582783234979302113-871732600-15653521319921282691757791318450698081-1147321235"
                1⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2180
              • C:\Windows\system32\conhost.exe
                \??\C:\Windows\system32\conhost.exe "-1846021083962916927-860225627217952881-16151101331808613853-5078478441770754723"
                1⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in System32 directory
                • Suspicious use of SetWindowsHookEx
                PID:1612
              • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
                C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\winlogon.exe 
                1⤵
                  PID:2096
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\services.exe 
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2100
                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
                  C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe 
                  1⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1940

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\1008510c01ae812ac9411c6f1abca788.exe 

                  Filesize

                  45KB

                  MD5

                  bd9270a629d91e2fa5d400ea6bbb764d

                  SHA1

                  4466bef39ba97084031c9a2f6d916829c28b00b6

                  SHA256

                  219b89f9a705dbac1b96f9ce3e503bce72eb8e0de9c320022348cb6ceabae433

                  SHA512

                  b9d159b4e955edcec70b6d76654999033582c3c4abde6550a0821a634bb65a441494aadff49d10c89b978cd2f68c97fe59365121367ef7578a36e7691688f1af

                • C:\Users\Admin\AppData\Local\Temp\1008510c01ae812ac9411c6f1abca788.exe 

                  Filesize

                  50KB

                  MD5

                  69beac0954c38e170a6db8c50fe6a055

                  SHA1

                  2b16d43fa9c5d042a030b9267846cf254d47da75

                  SHA256

                  2f850319eb8dcefbd7d7c2f405c9b5a9e76ca7ebda34751017e2f23c01a00e8e

                  SHA512

                  c219d6d014898394116b1b19ac330143396af470198334f01b2944049b5bb9fe2c5febfcb040ff6ed2e75416908b7089ff0261b7c7c2029a60c3cae8a01666a1

                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\MSVBVM60.DLL

                  Filesize

                  73KB

                  MD5

                  7707d1f9178bc05315d88a69aaa3abdd

                  SHA1

                  b32f0705bb7f8ddea9b46b50ff07f1e295c4e33f

                  SHA256

                  b33b5f68192d13bb50ed84fa40e502f4b4b7a574163c84def84501d48002a9db

                  SHA512

                  6a0b59e2dc5e9313020f196a6790a0fe831d1a5a108bf9d01994eb094190a45d7f4906acda960e11bd6886d4584a485eb38aded98b794813c908b364eea91901

                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\Paraysutki_VM_Community

                  Filesize

                  27KB

                  MD5

                  c86878f6125ec9f2176b6fe4ca2caa57

                  SHA1

                  a31e5953366ab551c9b2eeb9cc34a9a8fb03be13

                  SHA256

                  266acf22dcec348f7019d2d204f9e918d33d84d24fe10db8c88e319509b9b03b

                  SHA512

                  d9032dc6e9128d5ac61e17810a85a32049b5fde639378a405077636ee6c1b9e850143aa1a3af73a63fe623348add7ab86952c7ed3a2a6e176306347fdd47348e

                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

                  Filesize

                  33KB

                  MD5

                  1d1e61fec1240fc0d82dfd6290655314

                  SHA1

                  edbbf06a41cae7a38c95e2215f32afb6676860b3

                  SHA256

                  8746a3dda8fcfb604b4fd4df82a6e02c2e7d1b39f527679107d49168b1953577

                  SHA512

                  6692e73d13286352ef83058fff110925fa64205810585723381fb19a8a5f059749308aa5567104113097e4d7485c7747ace7b759ca54a4e710ed8093ac3b03f3

                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

                  Filesize

                  123KB

                  MD5

                  751c6951834f1c7b1a75a78b0a641522

                  SHA1

                  dd3a8ce9b85b44b2b0353fa603ab9b8f63b3ef05

                  SHA256

                  38d7bda3dd473d1cf2714cb9faad2accf720a9c37b795d2570e31455534dc64a

                  SHA512

                  4b7c3fafc65af313037bb4848d1f4d83326c38b44cc5edeb89722dc2bb478625c5be95ba3070bad814df9139285729d07cf555005146de40ef133670fc7fae8d

                • C:\Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

                  Filesize

                  127KB

                  MD5

                  5473b7e5062d6971f643f6feeb38c01b

                  SHA1

                  345ad2ce3c5bf79b442c80fbec4dfd8607328f3e

                  SHA256

                  1c4638d906cf616492b39b3150d2328bb6c59ce217ad96a2d3e163c0ef18fad2

                  SHA512

                  31db327456f5024c4df42581058bfe31f36a4dac52b7d6b6ace5ce8e5f19b8bf440f8a7ca335564892164abe6a95e205c06973d11cf4abfc8ec198ef4e3f1182

                • \??\c:\windows\SysWOW64\maxtrox.txt

                  Filesize

                  8B

                  MD5

                  24865ca220aa1936cbac0a57685217c5

                  SHA1

                  37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

                  SHA256

                  841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

                  SHA512

                  c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062

                • \Users\Admin\AppData\Local\Temp\1008510c01ae812ac9411c6f1abca788.exe 

                  Filesize

                  47KB

                  MD5

                  6c969fc8478ea80d9b66fd07fdf66f7d

                  SHA1

                  8a13a427c2ff883aa5dccc3bf73af8d5ace69c26

                  SHA256

                  702b88aab12625662f4fc805929502d5ac523c46e41889a0c5afe733892b9055

                  SHA512

                  55b5ee010f4452cdd61dfb4a66331abf2081e191d1673991812f3116f6f273a036be13bf9d6a7d2ca962d529cbae177e8d1f058ec902a827dd2542de169bbdbb

                • \Users\Admin\AppData\Roaming\Microsoft\uxnw.exe

                  Filesize

                  76KB

                  MD5

                  48a21b59d29ac98bbaa678171f5c6d18

                  SHA1

                  6764a2254eb95be16ea66e2c912944e5b15d9fdc

                  SHA256

                  c82e2e4a6667f79c339102532f86f10d42d19e09aa91a5e72d4a49a5f7631283

                  SHA512

                  56b662bfadce02f4d0db5c38eb5b3b3d3f21a8ed9a336d49a7f0339dd2f5d13ed3e7ab3b004c83362de7f61ae29e5da244c50c8573e4e0ab5da21c81cc199b78

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\csrss.exe

                  Filesize

                  114KB

                  MD5

                  d77b5f21ef069d839a69981aeb33546f

                  SHA1

                  8cecb46789fffa7eaf0be8eaca17a48da58bedad

                  SHA256

                  16f1be73d54382991b6f79493fc3fed39dec37e9084fc8bb67d4c27f201548fe

                  SHA512

                  89f816e7310d76e6bb5a9f2da170522dbd45e146bfa6431fea915718b1eda4b8d324305ea7907efb0e2af30f26f3b9c834a88d2383513d1969378881da1819b9

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\lsass.exe

                  Filesize

                  45KB

                  MD5

                  22df0c5433ce10f55b1889f85c9cae4a

                  SHA1

                  d92e67dad6ee476dc56ed402bbf0b94a812dbee9

                  SHA256

                  8691d24e7e1c9a97728fa6af006aa7f3666fd1b04b758d5a5abd997dd04b0263

                  SHA512

                  4671c974be4c4d589d1057c45268628ba0efcb56a1ebef14413222edc172b8792b03ed6ec0a9d9b73302fb45bb835e5d6959fc28986bd49cd92729344005b995

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  468KB

                  MD5

                  99ae1384ddf049782ee275381dd1543b

                  SHA1

                  be5e09f970fd814935bec5695aa6dbab53d1e00f

                  SHA256

                  5df703f0879124abb7e05cbbd1e8ebfcf94a6e632ec996d816e6efc49763e648

                  SHA512

                  416e133841cec091e42ca6845a995704c988d26501002ae6c62c5c779282512a417e01af92ffb18fbc30ec63a49931c1a36107268babdcb6774305796421476b

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  158KB

                  MD5

                  a929f56c9ec9a1150f7331352c8eaa8b

                  SHA1

                  558b8ff655874cefe5cd2033e25a3e8297604205

                  SHA256

                  4269a858ecb3cae42bc532e04cde1713fdccde65db097a1d7105c77438cfa397

                  SHA512

                  bbe331ca042e6ba1d9e0eb7c4363e9a7960a5d9adb7d6cf1204c702d85f5c69ffbc615cdae4a7763e22e3a002e80894c2b2e1445f5c39ecea7f0ccf19587dd29

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  342KB

                  MD5

                  0a71f1382813630d23c4a33cee3ff7d0

                  SHA1

                  71b9cd8e0da11bd553c0fdd0391d9620fb723baa

                  SHA256

                  2f48a6d116ccb245a29557945b0da74cd637c6c53ef4f396aacb8b6357f05453

                  SHA512

                  29d56c6a06e63bdb155f8f3118a8d4410f00e56eac7b496b7b338d688bed58ddd265d270a9bad8c6e74c6c651c4379f09d85d60a65e5e054638dc06f892a11a9

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  32KB

                  MD5

                  1eaa7a891d31a10138ec631c5e051563

                  SHA1

                  3d5eef2915dfcc40af5c2f4c9e074b9cc1aa640f

                  SHA256

                  f93580fc76b056f0a4bf00b985375089132089d2039cd3eca0246ad1764b0e9b

                  SHA512

                  85494aadc0ba74ff977935afc611e4f89f5cb0619b84d8d48cf6c3911cd74d5128b261b1528e8b1c681caaf871e334c386a02f4ecd3e7820b4425a80b91556eb

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  49KB

                  MD5

                  9ec60a72d01559d89cc4ca9820a2af9f

                  SHA1

                  ee11121e681e09b9d812058570bb0297e2fc84de

                  SHA256

                  90ce8e3be0f5b71b8046b3e96615ce7e42e0a861c3b9a6f57cd0193627ea28f3

                  SHA512

                  50f983a4860081d0fc4606df6756997778837e7b32ddcc99437016f52b3fd007a14809004237a0392a18100a51072c6f238a9cc3a9628ed1285ec16ebd0eb9f0

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  417KB

                  MD5

                  bf071af867344ddd2ce6b0e876cdd4f2

                  SHA1

                  11e173193895653eead93717cfa9bc8ab2ad8c3a

                  SHA256

                  078742304555ee3fcf4e4259fce89ae7242366fe2f73dbeca63641e38c2c4a99

                  SHA512

                  c96340d80422b22bcb776b85219001866afe2a4897305e28cc2fd8ef0314430ea169b9dd1bd1d4778a7415b8cd11ab847f3ae18ca0405ad2c73156069fc11a9d

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  70KB

                  MD5

                  f060af9a247c4a8983efae5e52d6f61b

                  SHA1

                  8e17d031e908038a9540dd14b8fe865408a11f74

                  SHA256

                  16f85ec226d930c7da4d9f9d81db605a7ab039c8c60d0f884ef52a1bd484cc89

                  SHA512

                  e3a739edd7b2ff9c3eec062cd7e4b851c25ecbf77128153592a2506b6dc423885d6e4c35b07618f8076e567ca2a5b1f9b5a958fb8a94efbc1fa9d825961cf351

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  49KB

                  MD5

                  fa64df32ffd8ac17963e092b8d74a707

                  SHA1

                  543dc73ded5e4e7fc9cdae2bb0064bb4fca0293f

                  SHA256

                  86a8ddfbdf83a80c93fd0b6c105a3027f9672d267396869738cc049ecace3f8d

                  SHA512

                  50d9bcb1900da85ce97bd7328736e56837f2c1d5bcb56e310871d2318d256149a6245bb26576178794d0ed9ed281a1d645f3fc05a549615587a1345e0ae55b0e

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  151KB

                  MD5

                  71d6f5c1dcae058f06ea7da32faab947

                  SHA1

                  3895a02e3b07b23f888d90718dd5538bacacd9e9

                  SHA256

                  36e21c7fdd0c388a2984e233e48c65089800447259224dc392806f530aa5257d

                  SHA512

                  e01143d3f6d166c9cb074a3e19cee0df3312fe15aaf904a90e1ea991859e59fa304c91e085046817357e28a4fd974339bb27422d9285f863717f9a8932124c83

                • \Windows\SysWOW64\~A~m~B~u~R~a~D~u~L~\msvbvm60.dll

                  Filesize

                  122KB

                  MD5

                  a50b9a7333fd41f01d4826b9d5e4cb9f

                  SHA1

                  351d76aa4dfbe77fecd5eceeadf8c2a3ff99ef73

                  SHA256

                  024c960d848fbad7176a2436e719f860163aca6c270caedc74f0c5407ae41c70

                  SHA512

                  1b7c0730dc27dd48b0e929cad8dd8b4e02592f2c66a3bca3bb0404facdc5f4108e80f82f75cf916444147c5c47e7af203ef3d79f282fff0ea2511e7c6c03d518

                • memory/268-394-0x0000000000230000-0x0000000000250000-memory.dmp

                  Filesize

                  128KB

                • memory/552-326-0x0000000000240000-0x0000000000260000-memory.dmp

                  Filesize

                  128KB

                • memory/896-267-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/980-398-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/984-316-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1048-386-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1124-91-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1124-237-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1180-256-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1180-427-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1520-288-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1520-425-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1528-240-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1568-281-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1612-257-0x00000000002B0000-0x00000000002D0000-memory.dmp

                  Filesize

                  128KB

                • memory/1628-371-0x00000000001C0000-0x00000000001E0000-memory.dmp

                  Filesize

                  128KB

                • memory/1636-407-0x00000000003C0000-0x00000000003E0000-memory.dmp

                  Filesize

                  128KB

                • memory/1704-351-0x0000000000230000-0x0000000000250000-memory.dmp

                  Filesize

                  128KB

                • memory/1712-275-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1732-185-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1732-417-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1792-379-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1800-222-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1816-255-0x00000000003D0000-0x00000000003F0000-memory.dmp

                  Filesize

                  128KB

                • memory/1816-168-0x00000000003D0000-0x00000000003F0000-memory.dmp

                  Filesize

                  128KB

                • memory/1932-115-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1940-367-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/1980-264-0x00000000003D0000-0x00000000003F0000-memory.dmp

                  Filesize

                  128KB

                • memory/2060-300-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2096-416-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2120-260-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2180-339-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2180-346-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2328-411-0x00000000002C0000-0x00000000002E0000-memory.dmp

                  Filesize

                  128KB

                • memory/2340-202-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2392-340-0x0000000000230000-0x0000000000250000-memory.dmp

                  Filesize

                  128KB

                • memory/2392-305-0x0000000000230000-0x0000000000250000-memory.dmp

                  Filesize

                  128KB

                • memory/2412-232-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2412-229-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2440-304-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2440-419-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2528-187-0x00000000001C0000-0x00000000001C6000-memory.dmp

                  Filesize

                  24KB

                • memory/2528-181-0x00000000001C0000-0x00000000001E0000-memory.dmp

                  Filesize

                  128KB

                • memory/2560-297-0x0000000000240000-0x0000000000260000-memory.dmp

                  Filesize

                  128KB

                • memory/2576-350-0x0000000000230000-0x0000000000250000-memory.dmp

                  Filesize

                  128KB

                • memory/2616-360-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2640-354-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2652-112-0x00000000003C0000-0x00000000003E0000-memory.dmp

                  Filesize

                  128KB

                • memory/2684-7-0x00000000002B0000-0x00000000002D0000-memory.dmp

                  Filesize

                  128KB

                • memory/2684-12-0x00000000002B0000-0x00000000002D0000-memory.dmp

                  Filesize

                  128KB

                • memory/2684-199-0x00000000002B0000-0x00000000002D0000-memory.dmp

                  Filesize

                  128KB

                • memory/2712-236-0x0000000000230000-0x0000000000250000-memory.dmp

                  Filesize

                  128KB

                • memory/2732-347-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2736-429-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2736-221-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2736-15-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2752-364-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB

                • memory/2820-366-0x0000000000270000-0x0000000000290000-memory.dmp

                  Filesize

                  128KB

                • memory/2820-323-0x0000000000270000-0x0000000000290000-memory.dmp

                  Filesize

                  128KB

                • memory/2892-271-0x0000000000270000-0x0000000000290000-memory.dmp

                  Filesize

                  128KB

                • memory/2892-215-0x0000000000270000-0x0000000000290000-memory.dmp

                  Filesize

                  128KB

                • memory/2940-272-0x0000000000310000-0x0000000000330000-memory.dmp

                  Filesize

                  128KB

                • memory/3016-375-0x0000000000400000-0x0000000000420000-memory.dmp

                  Filesize

                  128KB