Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 03:17

General

  • Target

    f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8.exe

  • Size

    272KB

  • MD5

    8a0dd35e956381e5549ddfae9ab13960

  • SHA1

    1665be89594880d1bd88f952d1d2ea7a62107125

  • SHA256

    f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8

  • SHA512

    5ec852575c78c05f05a5bbd0da0518411a636f5adf69532ec8c1a09fd8db647e96a3e537dc20917c880d10a64e93f036702975b359a32bb159b26294d11f33ff

  • SSDEEP

    3072:YMBGBT753Q+RgWgMlIx1ZiXjb6aEF6D0NM9voeLNZ2j8Ci2:dw753RgWg4aAXjb6aEFfooeLNZxC

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 32 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 15 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 15 IoCs
  • Disables RegEdit via registry modification 16 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 16 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 64 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 48 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 48 IoCs
  • Modifies Internet Explorer start page 1 TTPs 16 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8.exe
    "C:\Users\Admin\AppData\Local\Temp\f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2132
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1948
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 388
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2956
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2324
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2184
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2504
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 376
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:532
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Disables RegEdit via registry modification
          • Disables cmd.exe use via registry modification
          • Executes dropped EXE
          • Modifies system executable filetype association
          • Adds Run key to start application
          • Modifies WinLogon
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:2964
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 400
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:3044
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:1968
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:876
        • C:\Windows\SysWOW64\Shell.exe
          "C:\Windows\system32\Shell.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visibility of file extensions in Explorer
          • Modifies visiblity of hidden/system files in Explorer
          • Disables RegEdit via registry modification
          • Disables cmd.exe use via registry modification
          • Executes dropped EXE
          • Modifies system executable filetype association
          • Adds Run key to start application
          • Modifies WinLogon
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Modifies Control Panel
          • Modifies Internet Explorer settings
          • Modifies Internet Explorer start page
          • Modifies registry class
          • Suspicious use of SetWindowsHookEx
          • System policy modification
          PID:2060
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 408
            5⤵
            • Program crash
            PID:1488
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:3036
            • C:\Windows\SysWOW64\Shell.exe
              "C:\Windows\system32\Shell.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              PID:3056
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2176
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:2116
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1808
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:2792
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2324
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2104
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:492
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:680
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1148
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2928
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:1340
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1928
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1232
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2392
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1948
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:2408
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2352
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
            PID:352
          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
            4⤵
              PID:2740
            • C:\Windows\Tiwi.exe
              C:\Windows\Tiwi.exe
              4⤵
                PID:564
              • C:\Windows\SysWOW64\IExplorer.exe
                C:\Windows\system32\IExplorer.exe
                4⤵
                • Modifies WinLogon for persistence
                • Modifies visibility of file extensions in Explorer
                • Modifies visiblity of hidden/system files in Explorer
                • Disables RegEdit via registry modification
                • Disables cmd.exe use via registry modification
                • Modifies system executable filetype association
                • Adds Run key to start application
                • Modifies WinLogon
                • Drops file in System32 directory
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Modifies Control Panel
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                • Modifies registry class
                • System policy modification
                PID:2660
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 376
                  5⤵
                  • Program crash
                  PID:2748
                  • C:\Windows\SysWOW64\Shell.exe
                    "C:\Windows\system32\Shell.exe"
                    6⤵
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    PID:2532
                  • C:\Windows\SysWOW64\Shell.exe
                    "C:\Windows\system32\Shell.exe"
                    6⤵
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2732
              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                4⤵
                  PID:1432
                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:2432
                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:1680
              • C:\Windows\SysWOW64\IExplorer.exe
                C:\Windows\system32\IExplorer.exe
                3⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Suspicious use of SetWindowsHookEx
                PID:1804
              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2596
              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2416
              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1476
              • C:\Windows\Tiwi.exe
                C:\Windows\Tiwi.exe
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2412
              • C:\Windows\SysWOW64\IExplorer.exe
                C:\Windows\system32\IExplorer.exe
                3⤵
                • Executes dropped EXE
                • Drops file in System32 directory
                • Drops file in Windows directory
                • Suspicious use of SetWindowsHookEx
                PID:2460
              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                3⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2580
              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                3⤵
                • Modifies WinLogon for persistence
                • Modifies visibility of file extensions in Explorer
                • Modifies visiblity of hidden/system files in Explorer
                • Disables RegEdit via registry modification
                • Disables cmd.exe use via registry modification
                • Executes dropped EXE
                • Modifies system executable filetype association
                • Adds Run key to start application
                • Modifies WinLogon
                • System Location Discovery: System Language Discovery
                • Modifies Control Panel
                • Modifies Internet Explorer settings
                • Modifies Internet Explorer start page
                • Modifies registry class
                • Suspicious use of SetWindowsHookEx
                • System policy modification
                PID:2456
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 376
                  4⤵
                  • Program crash
                  PID:1036
                  • C:\Windows\SysWOW64\Shell.exe
                    "C:\Windows\system32\Shell.exe"
                    5⤵
                    • Modifies WinLogon for persistence
                    • Modifies visibility of file extensions in Explorer
                    • Modifies visiblity of hidden/system files in Explorer
                    • Disables RegEdit via registry modification
                    • Disables cmd.exe use via registry modification
                    • Executes dropped EXE
                    • Modifies system executable filetype association
                    • Adds Run key to start application
                    • Enumerates connected drives
                    • Modifies WinLogon
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    • Modifies Control Panel
                    • Modifies Internet Explorer settings
                    • Modifies Internet Explorer start page
                    • Modifies registry class
                    • Suspicious behavior: GetForegroundWindowSpam
                    • Suspicious use of SetWindowsHookEx
                    • System policy modification
                    PID:1692
                    • C:\Windows\Tiwi.exe
                      C:\Windows\Tiwi.exe
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:1556
                    • C:\Windows\SysWOW64\IExplorer.exe
                      C:\Windows\system32\IExplorer.exe
                      6⤵
                      • Modifies WinLogon for persistence
                      • Modifies visibility of file extensions in Explorer
                      • Modifies visiblity of hidden/system files in Explorer
                      • Disables RegEdit via registry modification
                      • Disables cmd.exe use via registry modification
                      • Executes dropped EXE
                      • Modifies system executable filetype association
                      • Adds Run key to start application
                      • Modifies WinLogon
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Modifies Control Panel
                      • Modifies Internet Explorer settings
                      • Modifies Internet Explorer start page
                      • Modifies registry class
                      • Suspicious use of SetWindowsHookEx
                      • System policy modification
                      PID:2796
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 368
                        7⤵
                        • Program crash
                        PID:2876
                        • C:\Windows\SysWOW64\Shell.exe
                          "C:\Windows\system32\Shell.exe"
                          8⤵
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of SetWindowsHookEx
                          PID:2880
                        • C:\Windows\SysWOW64\Shell.exe
                          "C:\Windows\system32\Shell.exe"
                          8⤵
                          • Executes dropped EXE
                          • Drops file in System32 directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:2324
                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:3004
                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2632
                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:2628
                    • C:\Windows\Tiwi.exe
                      C:\Windows\Tiwi.exe
                      6⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:1428
                    • C:\Windows\SysWOW64\IExplorer.exe
                      C:\Windows\system32\IExplorer.exe
                      6⤵
                      • Drops file in System32 directory
                      • Drops file in Windows directory
                      PID:1380
                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:1148
                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                      6⤵
                        PID:1972
                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                        6⤵
                        • System Location Discovery: System Language Discovery
                        PID:748
                      • C:\Windows\Tiwi.exe
                        C:\Windows\Tiwi.exe
                        6⤵
                          PID:2160
                        • C:\Windows\SysWOW64\IExplorer.exe
                          C:\Windows\system32\IExplorer.exe
                          6⤵
                          • Modifies WinLogon for persistence
                          • Modifies visibility of file extensions in Explorer
                          • Modifies visiblity of hidden/system files in Explorer
                          • Disables RegEdit via registry modification
                          • Disables cmd.exe use via registry modification
                          • Modifies system executable filetype association
                          • Adds Run key to start application
                          • Modifies WinLogon
                          • Drops file in System32 directory
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Modifies Control Panel
                          • Modifies Internet Explorer settings
                          • Modifies Internet Explorer start page
                          • Modifies registry class
                          • System policy modification
                          PID:2412
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 376
                            7⤵
                            • Program crash
                            PID:2636
                            • C:\Windows\SysWOW64\Shell.exe
                              "C:\Windows\system32\Shell.exe"
                              8⤵
                              • Drops file in Windows directory
                              PID:1572
                            • C:\Windows\SysWOW64\Shell.exe
                              "C:\Windows\system32\Shell.exe"
                              8⤵
                              • Drops file in System32 directory
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:1124
                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:2580
                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:2364
                        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:2176
                        • C:\Windows\Tiwi.exe
                          C:\Windows\Tiwi.exe
                          6⤵
                            PID:2644
                          • C:\Windows\SysWOW64\IExplorer.exe
                            C:\Windows\system32\IExplorer.exe
                            6⤵
                            • Drops file in System32 directory
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:2816
                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                            6⤵
                              PID:1836
                            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                              6⤵
                                PID:2720
                              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2308
                              • C:\Windows\Tiwi.exe
                                C:\Windows\Tiwi.exe
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2104
                              • C:\Windows\SysWOW64\IExplorer.exe
                                C:\Windows\system32\IExplorer.exe
                                6⤵
                                • Drops file in System32 directory
                                • Drops file in Windows directory
                                PID:996
                              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:3008
                              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                6⤵
                                  PID:1380
                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2124
                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:1448
                          • C:\Windows\Tiwi.exe
                            C:\Windows\Tiwi.exe
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:2540
                          • C:\Windows\SysWOW64\IExplorer.exe
                            C:\Windows\system32\IExplorer.exe
                            3⤵
                            • Modifies WinLogon for persistence
                            • Modifies visibility of file extensions in Explorer
                            • Modifies visiblity of hidden/system files in Explorer
                            • Disables RegEdit via registry modification
                            • Disables cmd.exe use via registry modification
                            • Modifies system executable filetype association
                            • Adds Run key to start application
                            • Modifies WinLogon
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            • Modifies Control Panel
                            • Modifies Internet Explorer settings
                            • Modifies Internet Explorer start page
                            • Modifies registry class
                            • System policy modification
                            PID:2012
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 376
                              4⤵
                              • Program crash
                              PID:340
                              • C:\Windows\SysWOW64\Shell.exe
                                "C:\Windows\system32\Shell.exe"
                                5⤵
                                • Drops file in System32 directory
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:1156
                              • C:\Windows\SysWOW64\Shell.exe
                                "C:\Windows\system32\Shell.exe"
                                5⤵
                                • Drops file in System32 directory
                                PID:1624
                          • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                            "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                            3⤵
                              PID:2472
                            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2404
                            • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                              "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2696
                            • C:\Windows\Tiwi.exe
                              C:\Windows\Tiwi.exe
                              3⤵
                                PID:608
                              • C:\Windows\SysWOW64\IExplorer.exe
                                C:\Windows\system32\IExplorer.exe
                                3⤵
                                • Drops file in System32 directory
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:1788
                              • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                3⤵
                                  PID:2948
                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2852
                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2152
                                • C:\Windows\Tiwi.exe
                                  C:\Windows\Tiwi.exe
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2292
                                • C:\Windows\SysWOW64\IExplorer.exe
                                  C:\Windows\system32\IExplorer.exe
                                  3⤵
                                  • Drops file in System32 directory
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:780
                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1340
                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2396
                                • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                  "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                  3⤵
                                    PID:924
                                  • C:\Windows\Tiwi.exe
                                    C:\Windows\Tiwi.exe
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:684
                                  • C:\Windows\SysWOW64\IExplorer.exe
                                    C:\Windows\system32\IExplorer.exe
                                    3⤵
                                    • Modifies WinLogon for persistence
                                    • Modifies visibility of file extensions in Explorer
                                    • Modifies visiblity of hidden/system files in Explorer
                                    • Disables RegEdit via registry modification
                                    • Disables cmd.exe use via registry modification
                                    • Modifies system executable filetype association
                                    • Adds Run key to start application
                                    • Enumerates connected drives
                                    • Modifies WinLogon
                                    • Drops file in System32 directory
                                    • Drops file in Windows directory
                                    • Modifies Control Panel
                                    • Modifies Internet Explorer settings
                                    • Modifies Internet Explorer start page
                                    • Modifies registry class
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • System policy modification
                                    PID:1996
                                    • C:\Windows\Tiwi.exe
                                      C:\Windows\Tiwi.exe
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1012
                                    • C:\Windows\SysWOW64\IExplorer.exe
                                      C:\Windows\system32\IExplorer.exe
                                      4⤵
                                      • Drops file in System32 directory
                                      • Drops file in Windows directory
                                      PID:2028
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1312
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2808
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:1556
                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                    "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                    3⤵
                                      PID:2740
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                      3⤵
                                        PID:2412
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3020
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                      2⤵
                                      • Modifies WinLogon for persistence
                                      • Modifies visibility of file extensions in Explorer
                                      • Modifies visiblity of hidden/system files in Explorer
                                      • Disables RegEdit via registry modification
                                      • Disables cmd.exe use via registry modification
                                      • Executes dropped EXE
                                      • Modifies system executable filetype association
                                      • Adds Run key to start application
                                      • Modifies WinLogon
                                      • Modifies Control Panel
                                      • Modifies Internet Explorer settings
                                      • Modifies Internet Explorer start page
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      • System policy modification
                                      PID:1972
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 368
                                        3⤵
                                        • Loads dropped DLL
                                        • Program crash
                                        PID:1784
                                        • C:\Windows\SysWOW64\Shell.exe
                                          "C:\Windows\system32\Shell.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Drops file in Windows directory
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1976
                                        • C:\Windows\SysWOW64\Shell.exe
                                          "C:\Windows\system32\Shell.exe"
                                          4⤵
                                          • Executes dropped EXE
                                          • Drops file in System32 directory
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2952
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                      2⤵
                                      • Modifies WinLogon for persistence
                                      • Modifies visibility of file extensions in Explorer
                                      • Modifies visiblity of hidden/system files in Explorer
                                      • Disables RegEdit via registry modification
                                      • Disables cmd.exe use via registry modification
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Modifies system executable filetype association
                                      • Adds Run key to start application
                                      • Enumerates connected drives
                                      • Modifies WinLogon
                                      • Drops file in System32 directory
                                      • Drops file in Windows directory
                                      • Modifies Control Panel
                                      • Modifies Internet Explorer settings
                                      • Modifies Internet Explorer start page
                                      • Modifies registry class
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      • System policy modification
                                      PID:1596
                                      • C:\Windows\Tiwi.exe
                                        C:\Windows\Tiwi.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2896
                                      • C:\Windows\SysWOW64\IExplorer.exe
                                        C:\Windows\system32\IExplorer.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Drops file in Windows directory
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2900
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2592
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1920
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2688
                                      • C:\Windows\Tiwi.exe
                                        C:\Windows\Tiwi.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2956
                                      • C:\Windows\SysWOW64\IExplorer.exe
                                        C:\Windows\system32\IExplorer.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1948
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1960
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2804
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1636
                                      • C:\Windows\Tiwi.exe
                                        C:\Windows\Tiwi.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2676
                                      • C:\Windows\SysWOW64\IExplorer.exe
                                        C:\Windows\system32\IExplorer.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • Drops file in System32 directory
                                        • Drops file in Windows directory
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2596
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2640
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2012
                                      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                        3⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2472
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:688
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1520
                                    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
                                      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2392

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

                                    Filesize

                                    45KB

                                    MD5

                                    eaad2722399087e0adf8a49874b11aec

                                    SHA1

                                    9477cf5225df4abd86b9997557f9bd20b48f1f2f

                                    SHA256

                                    7161b24420f1dd41bf88d786859cccd70297cf3330f127a7fe15a3f2bf3d2fae

                                    SHA512

                                    9c74932d2ac9924efee251ddfd0c161d31a9aca2f596bb6ed751317f30ead43b1e19c7b0bca163e1493806e3c1ea8decbdaf0229d04135957d1fc7246771d6be

                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

                                    Filesize

                                    272KB

                                    MD5

                                    eba923225e4c59751c72cd516aaa9aea

                                    SHA1

                                    12a1a89d33e443ace897b311e043184960e3cd11

                                    SHA256

                                    289f493ade42481c7c8c9150c815c168c10643a8636006d22eb9008af6205b4f

                                    SHA512

                                    6be96d5fc77bd39fa22f58931f3bcb2358a6d3ef999b698498fab69920466c5c26fde0a7e6ad283b1a01825f3160159e35f2ff11e1fe523808e91f08b7eb1c86

                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

                                    Filesize

                                    272KB

                                    MD5

                                    12a1b69bd80aab9f718060d897b2315b

                                    SHA1

                                    407eaa460da114f045c0536c37b1e383595d9121

                                    SHA256

                                    9970627351ce179c5123b0f6353e76ccb4d98c346b9fbebc4ba79136c23afd4d

                                    SHA512

                                    b6ad3fa7750f03172f86ad47de72bf42aa252e837561533b2538e76db381eda5670aea48f1f1f5585c6baf28ae9716d1cf04087b53f8f871af8b13656b5a74a4

                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

                                    Filesize

                                    45KB

                                    MD5

                                    0aadec345b7cbc86e9e3e072f27e70fe

                                    SHA1

                                    42b817c2fc67145360ba20089f721194522c7dee

                                    SHA256

                                    b8f136629c6aa42f9ca90b549932df60d520747e35b350855756f4b6cc95d629

                                    SHA512

                                    cbc04352e797a236c881e2f0595ecb56991f8aff6685e0eb7c872d108b35dddb65f6a2d701d5066a223c3cb847723771a89fcebc4969172c558db1c3a2ddef20

                                  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

                                    Filesize

                                    272KB

                                    MD5

                                    446167bf05d7d1d094f00d8cc013f07a

                                    SHA1

                                    f276caa74da4b74b5e08f938cbd1b325515718ed

                                    SHA256

                                    d592a03a4bee84ea41f629ed68327081005ba997460790a3b73e6b5d408fbefa

                                    SHA512

                                    a8451abe329073cac7c1fe0c7809ad36cf6fdd0fc4705475987bd9ca6338d62ef44d565fe69144613619f9a47be9f7e7434aee2edba067563ccfaeab7f29ce9d

                                  • C:\Windows\SysWOW64\shell.exe

                                    Filesize

                                    272KB

                                    MD5

                                    8a0dd35e956381e5549ddfae9ab13960

                                    SHA1

                                    1665be89594880d1bd88f952d1d2ea7a62107125

                                    SHA256

                                    f0288bf4853d925b2d32556d1c443bf6f81516a611e5816ee351f7c8756034b8

                                    SHA512

                                    5ec852575c78c05f05a5bbd0da0518411a636f5adf69532ec8c1a09fd8db647e96a3e537dc20917c880d10a64e93f036702975b359a32bb159b26294d11f33ff

                                  • C:\Windows\msvbvm60.dll

                                    Filesize

                                    1.3MB

                                    MD5

                                    5343a19c618bc515ceb1695586c6c137

                                    SHA1

                                    4dedae8cbde066f31c8e6b52c0baa3f8b1117742

                                    SHA256

                                    2246b4feae199408ea66d4a90c1589026f4a5800ce5a28e583b94506a8a73dce

                                    SHA512

                                    708d8a252a167fa94e3e1a49e2630d07613ff75a9a3e779a0c1fcbec44aa853a68c401f31a2b84152f46a05f7d93f4e5e502afc7a60236a22ac58dea73fa5606

                                  • C:\Windows\tiwi.exe

                                    Filesize

                                    272KB

                                    MD5

                                    daec2eaf9bb362fc916bcd91f4067fdd

                                    SHA1

                                    cf73ac24c739550905a3c2e3027134b0c2e539c2

                                    SHA256

                                    0eb1a3d517550002c7da9ac449ce53151da723570a05b0722d8b7cc448678de2

                                    SHA512

                                    f8872779c62364153fa12c9f0e1cd01e7639f2a13f2fdb539ddf43972c6bbd4740e5921546a0974aed31d243773c86037c99988fbb446972eaef68074b3b31a2

                                  • C:\Windows\tiwi.exe

                                    Filesize

                                    272KB

                                    MD5

                                    ca5e4c33216cad03b1f7a5b8b4eb7e26

                                    SHA1

                                    14bfa26145e3fe7097547c9096faa4365b0b586a

                                    SHA256

                                    492f6216e1fb8a98b5c333fe0abdf5a137db37c3734573a918dc97157af88936

                                    SHA512

                                    a3c20be6c58b2a698191e7f0655a8151ae145888d651a57d709e98999079579a0fd4b6b9b2b7a746fc4ae239c64e435e945d84a59240adcd6fc8e0bc8531407d

                                  • C:\present.txt

                                    Filesize

                                    729B

                                    MD5

                                    8e3c734e8dd87d639fb51500d42694b5

                                    SHA1

                                    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

                                    SHA256

                                    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

                                    SHA512

                                    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

                                  • C:\tiwi.exe

                                    Filesize

                                    272KB

                                    MD5

                                    e119d21334d79cfd3efe9ede6b4a2e39

                                    SHA1

                                    e04d2ddfc591597dd78c3e374f612b23559fe136

                                    SHA256

                                    8fbbf3ec0f2259e51c0b9663b8624f7bf08d0d36dcfa9fb18b7b66a830290cb3

                                    SHA512

                                    6f8a90a5bc4ea34ab6b0e4de9bf4148ddbf03c71214752224ee9498a2b834068f9afdf49313f0e5a8739c3fe66391cecfc143ae880ae5ba1ac085cb54c376161

                                  • C:\tiwi.exe

                                    Filesize

                                    272KB

                                    MD5

                                    294ef7569f4ce7d2cfcaa657d351bf31

                                    SHA1

                                    d84ad692ae552595351f97fae82311fcf92fc7ef

                                    SHA256

                                    4e7d523700463ed622ee6a9649b86760f51de9b357994021877069cc42ca40a3

                                    SHA512

                                    99c741f13276ce4f1db8e6120fd2c1ee8e945b9049e5616d6d677aa6b6288b206a23e86435899259b685721a0e5a0f60245d7484fb83312ea0dffd91e737cf9c

                                  • C:\tiwi.exe

                                    Filesize

                                    272KB

                                    MD5

                                    0983361ab8ddcaa0b1d11b874f455a88

                                    SHA1

                                    f753e1f5344ae26dc56692631b973c06e05ae24f

                                    SHA256

                                    42a65343ec5c26450741de94b1e4cc779c6929cba83bd7aa20d5574db8957387

                                    SHA512

                                    7ff0604ed4cf156f8cea269062b1f949b397c53354d1dc1390849db961c89d9fa8d07d932d8bc347a4445ee3068dfde430cc6882b4828b9b98635ca4a185a138

                                  • F:\autorun.inf

                                    Filesize

                                    39B

                                    MD5

                                    415c421ba7ae46e77bdee3a681ecc156

                                    SHA1

                                    b0db5782b7688716d6fc83f7e650ffe1143201b7

                                    SHA256

                                    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

                                    SHA512

                                    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

                                  • \Users\Admin\AppData\Local\WINDOWS\cute.exe

                                    Filesize

                                    272KB

                                    MD5

                                    3ed73e83d59572e5a6fd4c063ed464aa

                                    SHA1

                                    da9098138fdb29e9d6dcd5819a33e77de0008ee9

                                    SHA256

                                    ca6ca42cd0acc1ee22e25d93af74485364fb48c73146bd74d38ec34d63af7395

                                    SHA512

                                    c81595a8a38d74032f4b87f472ca565fbec70eb61a5a7a3f744a9a4b6c3edd0f18664508a04fd85eb5d1806959349434eccc0a538993f08397e3577a81b7eaca

                                  • \Users\Admin\AppData\Local\WINDOWS\imoet.exe

                                    Filesize

                                    272KB

                                    MD5

                                    3fcf0a35411112cba9e8639a11e2dd2a

                                    SHA1

                                    f2d042126fe8eca00391c42245a8872179a1ee2b

                                    SHA256

                                    b1018a1969484439cd20e5e5dbc332322a536b97e624e2d2e69ffacf67e7970e

                                    SHA512

                                    3b08b902aba281932f4564abada18e32328b0bafa7a504384070918a2d2b363078347366285a0cd36a4ca2cab250ebb25e74fd5080cec60d756694a22b7fdf6a

                                  • \Users\Admin\AppData\Local\WINDOWS\winlogon.exe

                                    Filesize

                                    272KB

                                    MD5

                                    145dc463c13d5aa110301a5af878861f

                                    SHA1

                                    03ac765745bc71bc8125e470135032a3539b1648

                                    SHA256

                                    3841497553881600d6d9fe9df932905bbf65ed3a7239a3f142cebc3fb0f148c9

                                    SHA512

                                    4408147b671c147feede1c3e7f01edd145755eeb69585b8fcb31344fa504d77a937d323c510e021e7cc75731da0ace1f49cc03a77907b412c02969c9adc2a07f

                                  • \Windows\SysWOW64\IExplorer.exe

                                    Filesize

                                    272KB

                                    MD5

                                    acafdd157abcb3750c7b2bd87d7e4b5b

                                    SHA1

                                    aec850bb76ec2d5874f8ea3572320dce31c11473

                                    SHA256

                                    56988d70ed68685fda99ea8546aaf6ef445ebf191bce4a1899ca8287c9b81e93

                                    SHA512

                                    dd073a91784c3f3a85d04ef12fef83802b18b6cd220e322311f15688271c8370d0e13e77fe7355240ed4e19e27cc0cfcc4f0850c8e163b380adde3d89b0b41af

                                  • \Windows\SysWOW64\shell.exe

                                    Filesize

                                    272KB

                                    MD5

                                    590036e9c05e5fbe39fd9ecba6249fa0

                                    SHA1

                                    f845478fbe8cbec0a2561cf5217809bf653de4f9

                                    SHA256

                                    955ce3a17bbd74e022fe56bd9b78b7da0ef898df601813fdb81cf426f7f6435b

                                    SHA512

                                    02e66b117eaeb2eab07b11a1dfde9ade41ed9b4c4d57a302ac7e5ef4419922d5775377675c5bccddf637d754507d019775d9367c056c2ada23ce2590ab02200f

                                  • memory/492-407-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/564-755-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/608-881-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/680-408-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/680-411-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/684-961-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/688-263-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/876-295-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1012-991-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1148-415-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1428-642-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1448-460-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1448-456-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1476-376-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1520-272-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1556-557-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1596-350-0x0000000002680000-0x00000000026C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-349-0x0000000002680000-0x00000000026C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-399-0x0000000002680000-0x00000000026C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-504-0x0000000002680000-0x00000000026C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-278-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-362-0x0000000002680000-0x00000000026C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-341-0x0000000002680000-0x00000000026C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-339-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-500-0x0000000002680000-0x00000000026C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-334-0x0000000002680000-0x00000000026C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1596-488-0x0000000002680000-0x00000000026C4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1804-348-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-361-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-436-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-369-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-508-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-470-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-444-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-507-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-451-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-400-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-321-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-340-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-455-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-320-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1808-438-0x0000000002760000-0x00000000027A4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1920-367-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1928-493-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1948-100-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1948-724-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/1948-498-0x0000000000220000-0x0000000000230000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/1948-143-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1968-285-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1972-338-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/1976-382-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2060-379-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2060-461-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2104-857-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2104-401-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2104-404-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2116-204-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-142-0x00000000026B0000-0x00000000026F4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-98-0x00000000026B0000-0x00000000026F4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-209-0x00000000026B0000-0x00000000026F4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-144-0x00000000026B0000-0x00000000026F4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-182-0x00000000026B0000-0x00000000026F4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-282-0x00000000026B0000-0x00000000026F4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-277-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-99-0x00000000026B0000-0x00000000026F4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-198-0x00000000026B0000-0x00000000026F4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-141-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2132-0-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2160-681-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2176-187-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2176-186-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2184-139-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2292-924-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2324-130-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2324-397-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2324-396-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2392-276-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2412-439-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2412-437-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2412-442-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2416-368-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2456-509-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2456-452-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2460-443-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2504-110-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2504-145-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2540-828-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2592-359-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2592-358-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2596-360-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2596-357-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2644-796-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2676-594-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2688-372-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2792-489-0x0000000002870000-0x00000000028B4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2792-620-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2792-492-0x0000000002870000-0x00000000028B4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2792-322-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2792-506-0x0000000002870000-0x00000000028B4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2792-505-0x0000000002870000-0x00000000028B4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2792-1025-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2792-398-0x0000000002870000-0x00000000028B4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2792-351-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2792-477-0x0000000002870000-0x00000000028B4000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2896-342-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2896-347-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2896-335-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2900-352-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2928-474-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2928-473-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2952-383-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2952-386-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2956-494-0x0000000000230000-0x0000000000240000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2956-496-0x0000000072940000-0x0000000072A93000-memory.dmp

                                    Filesize

                                    1.3MB

                                  • memory/2956-497-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2956-495-0x0000000000230000-0x0000000000240000-memory.dmp

                                    Filesize

                                    64KB

                                  • memory/2964-118-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/2964-146-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/3036-419-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB

                                  • memory/3056-423-0x0000000000400000-0x0000000000444000-memory.dmp

                                    Filesize

                                    272KB