Analysis

  • max time kernel
    120s
  • max time network
    116s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 11:44

General

  • Target

    a9ddfbdb600ebdb464bf5c690d72da10N.exe

  • Size

    488KB

  • MD5

    a9ddfbdb600ebdb464bf5c690d72da10

  • SHA1

    7f7895fca90edcb024e25ef33297e1d48b058762

  • SHA256

    70d36006f722e0f187a4ff137153710d47ebbc67d557c86e6ff2e037605d3188

  • SHA512

    ac5cca7fe1320323be981c0bb74dacfacbe17379c6d4b7da34bc09a97a06e3d7a520d03ca88181831158f226b1e1393eff108f9ef55e41eb01c2bbc997c1870d

  • SSDEEP

    12288:V/Mi/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:V5K2O2HIBEd7M

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 6 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9ddfbdb600ebdb464bf5c690d72da10N.exe
    "C:\Users\Admin\AppData\Local\Temp\a9ddfbdb600ebdb464bf5c690d72da10N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3824
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3320
      • C:\Windows\Notepad.exe
        Notepad.exe C:\Present.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:464
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2864
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:856
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3264
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2628
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:3756
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4660
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4520
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:492
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2724
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:2916
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:2452
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2120
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1836
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3216
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1460
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          PID:1564
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          PID:3940
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:3856
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4268
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:388
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2540
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4344
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:3280
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1448
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3388
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4456
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      PID:2372
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Suspicious use of SetWindowsHookEx
      PID:3548
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1484
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:208
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1636
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4524
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3472
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    7ecddf0504d0a13f31ff9fe6ff34b9cf

    SHA1

    6ad2346c56c85a364e8f143076d91297cc17efb8

    SHA256

    c9092e15088b5433c95edfbf8f11f31def530b83e2729ae9dbd60fbe6bf28bcd

    SHA512

    06164d2a40b73366bc2ff9cacf02026a72211102ec2cdc098177dec6d8cc4ad31474b3a453fc2724de8220a2f8d9af6bc7bc8ed5d680e8d40d853e9aa7f0225e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    5f0366c1e7378f0ae7b94e3a5be7247b

    SHA1

    39618f37e14a020344ff8df35ed5b3eca0a6428e

    SHA256

    623de5f59a4f8e7404cf2bd78c649f008723f778347d7269288ac6083b5475a9

    SHA512

    0d315f3928150ccb6e4ab9f46d2cd9db296581f7e0be2c09725124d43eb6109659eb632219a4d4908b6ee5a31a94e832595d85791d44139eee14209e68e93ad5

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    658f85e85304cf779246cc74a94fb724

    SHA1

    939a2a15f89972517de0cf5ff2d9f4330fe28961

    SHA256

    a2e2a07ce38adf4f4433e99ee3d8ba543d5e2de7af042baa4c2ca4e0270b775c

    SHA512

    1e68ba604247f27e76a61a471c53d3b950fee73fc352d6ca673d2c028e07137dd2365c18e7d86d3852ef1793ad4bcb3975e15e51ccb14d985457b489051abc50

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    9a4d694a308342559731f8be261a7255

    SHA1

    9401a54fc33dee3693a818665fd67cb38aab5618

    SHA256

    44cdca059ea6a49b9721fbc442d58814461b4856870e8c22d7e5a4252a4d700d

    SHA512

    88b0609fdeca5a00c9c719af78f2e2c5d6af24bf2510a8f564fb99f5295aeb97e1fa21d67cfd17e9815f39b14c662ef02d0facc52dc1382232ba16eb48fccd74

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    be7cfc5ca08d32bf10f28413ed246e78

    SHA1

    d687941370a98c40a951661d598eff7e9c82cf55

    SHA256

    cfa9f4bc36ab140221c72b114f6ccf60b017ea3fdd6dad60bd7456068f75770d

    SHA512

    545cb1697ea65c1cb7911d450b24f578e1540d41a0231c4ce39a5e898eb12519c17c716d29bc015e4f13ece169d3c290d5b9c37fa92a9b013db6afacd13c1b9a

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    a379d3b465ca4ee53b74d68f13bc6ce5

    SHA1

    ec99e6f5d52eed41ea9c63743cfcc06946d9f697

    SHA256

    89489fc6edad0a3ce05980c150335a5bbf7fab88459dce67ebc2672ef4390a45

    SHA512

    616daff7413a8f8d811da4ed3884a0d5e24a9bd915ad249d5ae630a12ad803641a4301ff0928545d23e0cd78bcca77de235e50d96db1972347effcee1e4e90b7

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    ec6be97270817ae17801f6c9c87e8872

    SHA1

    5c1c14557b226b328aa37b02286757d9e2fd5556

    SHA256

    c7909bd52e44362dabf93e3f4b7e0e33026cde8a586c5c382f35be6d0962418a

    SHA512

    0d8b693c4c1254883d7e390f5ae62dd8391a6ece56d893629a55b1282e4540bf17cf8fa565fd8a133541d6113322edfbdc3d56fc0e719713c53ab439f60e5dec

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    b149692e807bd1a4702b531c749d2cb9

    SHA1

    c0db7979331adc59a8d45e0389470a482e2fff32

    SHA256

    3c1e060d39f39f1ca727e12d8b8b61b5c5df5c26467c37a648768add4fe71344

    SHA512

    8621e05f9bddb91e1846e5846b14e5ece5b9dfbc7ef996f04f3f33d096271a8c14a2c21f1f295c031fd619d4aa850724505d02a90ab96a05688b4845bcd9cf62

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    509d4316971f6bbd35e0fcf894ee059b

    SHA1

    06a0251178ccc031f05df2b53ea89633cf03f6de

    SHA256

    9bf0d0f516350f4b44afe0a793fe20135a3226da448a346d494eeeea6749c800

    SHA512

    217351a8117ecfc1009830a3a4a4f28ec2774f349c17cf90534f86907ca23117683899935a92d9fd67665638d5ad3bd207d343ec6c3205bc0a4290d2b760e621

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    40341e5d3de1f6787c27e42e22c2914c

    SHA1

    bae73d890a82c350680940d99f22cfd53a9ded40

    SHA256

    a7474497adae46007dedef7c8c765fa78ee74485411cf845fd611cdaddb2561c

    SHA512

    bbfdb7da8bd05b97ba8eca36d9b4cd6d886b94e3a1ccc2d9c54d685c1a360546c291cd0c5349c7a9e8e60ffec9b478bc851361ebdccbc133a048879318bd110c

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    d307aa46839ead4cf416b9b9268fc1ef

    SHA1

    805a5b0cabb28f816e60d173384d0bf7cced955f

    SHA256

    3831ba1b4695c9cdb8c7e29e8eda1c4805021adcfe674b1d0e5bc9cb06c709f2

    SHA512

    6fe48501f8fd4f0442adc28dedced2b7ca189d1f056385ff6584f5426ca98673e5084ebc4e0f1ecb1d90211b8c261e019e9d9ce559b410a720d7d0d293b58c67

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    8f3c01d61d4c021c08ba4ac8e721ec73

    SHA1

    bdd46b81892fcad9d7caeca3a3763cfb791e684f

    SHA256

    ead89ee9e632ff049a9b608ad8f7b0d4d9ca77863a712862e440c7e7a67f6e8d

    SHA512

    f831e9fa19a16a589aaa13a5418739c0f6db06abc2ecb3773796d28018ceccfa75a544056b4c553127e559c07db7129ce38c4477d0d16dd2c78703a2a3ab9696

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    0f79002aa3d10ee488156bf27e42404c

    SHA1

    8da2c537aee5255288577816592acc38e18eaecc

    SHA256

    58961338a7c50d12695c2af4cc56ab13bc4ad6a3fabc1f5a7d4e6b617f2e2429

    SHA512

    0c68a7d547201c2002469d4032bf7536851f966e86da234f0abb2b5cb1261e212058a1d9dedeebd8fa51c1930d4ab7952852caf13b869f6ce23d4705f638b0af

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    a9ddfbdb600ebdb464bf5c690d72da10

    SHA1

    7f7895fca90edcb024e25ef33297e1d48b058762

    SHA256

    70d36006f722e0f187a4ff137153710d47ebbc67d557c86e6ff2e037605d3188

    SHA512

    ac5cca7fe1320323be981c0bb74dacfacbe17379c6d4b7da34bc09a97a06e3d7a520d03ca88181831158f226b1e1393eff108f9ef55e41eb01c2bbc997c1870d

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    7fb0b125700675e5392795f7548b8202

    SHA1

    112f965a834ad2eb0501b254217a4d48db6b4877

    SHA256

    e219a0c8e027087683a5fbe42cd61c3feb0cee11ed72635b6cb001a4eb20509c

    SHA512

    d9e719c83159848f307030756d288bbac65ddac671fe7744fc13becae060aa45f9defbcdbc9ab79bf3e7509a169d0a8b67b53b015563837091fa0df955afe328

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    cec91fddff788fa28e5eff14a0cc988f

    SHA1

    aef8839ec2072e8bfded0a1a801b3dce2a263a31

    SHA256

    569a51a8ca47cc6e8ef4f007effbca720239f906bd88a542c20229117e28dc6f

    SHA512

    aaa1bdb5960eedc0bc95517fae0e8ada2e240ad3e8b0d1076f22ba61a7d4b53bd396167fbe191e59efabf5ff06f01a4d4bf69ebf1d41cc1ad6292f3392335b17

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    d511404bb997c54f043f30813364b994

    SHA1

    676bd99a8ff1c16549467d33eec587b00d741219

    SHA256

    1cbe92101841e8e926956569d77c145902c535a685325793f5f5867b82f4273e

    SHA512

    759ba78d1c9d736fe11cfdcc356b3113046615452f8577354650c58f50361171e6a788931c7c0c092e507670d097550e91303c5350c6e9fd4e0f25d815b8ecb6

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/208-244-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/208-271-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/856-213-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/856-229-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1448-294-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1460-418-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1460-265-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1484-237-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1484-225-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1636-274-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1636-398-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2372-260-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2372-148-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2540-273-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2540-103-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2724-417-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2724-241-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2864-192-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2864-221-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3264-416-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3264-232-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3280-287-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3280-290-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3320-264-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3320-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3548-208-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3548-218-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3824-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3824-415-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3824-243-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4344-285-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB