Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 22:21

General

  • Target

    6aa2e20355d487340ec035c4a0542d55f4ad2e186cb4fa698ac12f3676aaaeb5.exe

  • Size

    488KB

  • MD5

    ba604643d5fce6f62d2d904aa79c135e

  • SHA1

    0c907c8e5439f5603e453b4e1ff2bdf55f1b6d74

  • SHA256

    6aa2e20355d487340ec035c4a0542d55f4ad2e186cb4fa698ac12f3676aaaeb5

  • SHA512

    1af4e2d51f95e7f43111d56a5ce3fdc6f9ad0fd6d793d0274c776194f1fb481114fdebd1a244ff08de75313fa7fec5866335764e1b36c8393455cbc15c11c94d

  • SSDEEP

    12288:V/M4/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VbK2O2HIBEd7M

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6aa2e20355d487340ec035c4a0542d55f4ad2e186cb4fa698ac12f3676aaaeb5.exe
    "C:\Users\Admin\AppData\Local\Temp\6aa2e20355d487340ec035c4a0542d55f4ad2e186cb4fa698ac12f3676aaaeb5.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3388
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4152
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2356
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1004
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3188
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:2712
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3040
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4424
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1148
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4828
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4780
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5056
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4732
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2072
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4568
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3232
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1092
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4812
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4252
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3484
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1056
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4612
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2592
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1184
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1144
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1348
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4460
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4760
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4620
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3332
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2464
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4888
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:64
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4584
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4308
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3104

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    dbf2049a2cdf788f8db56155a7e7acde

    SHA1

    de5152610f1b1cc7a4ba0e3adc9ecfe18f390275

    SHA256

    452106f4b34fca9e8f2d28c217279ae1c14dce1071861c992fe0333f5f02c537

    SHA512

    224f920f9ce5b9e1464c1bc9f4d577b6bded9059368679d80cc21b6492058d5e9a71b90848307c6c1bee3ca32ddc5b35f662ae52ab57ecf54475e1e5fa87963f

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    f2511f2d2e1f4d99382b28564797de0f

    SHA1

    08db3993e9eec06a5e8a34a98a249eec2d8561bb

    SHA256

    03562e64265699275bc21cac5ad5aba6aba5020194a7d3a58c9c25c5e7be3d0f

    SHA512

    038842ef52a820c7259f843b516b43f2b6f183b543eee49a08e184bda8862319862df73e69421f59f35011130fcf370676d6e526630eef464d797dc29d6711c5

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    b60ff674c268b75fcd15ed8aa2352d28

    SHA1

    e99636f14171774327f025517c4c92fc9631bdaf

    SHA256

    eeb96fffd7fa7b06f3fa9593d04e2bb74de93cb8a657f841561ddf484b0572bf

    SHA512

    062602b0b042c4e3cb8da7b07b09ee299ab9dbe219df3c3eb3898a9e76986aa381c7f65378ec7d1e4b97c7742273c20520ac34625a05cfbbca8a2626d6c8d2c5

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    b906244158e0d5199f44127d6c8a40d6

    SHA1

    9fa0259aa5c56214c453cd1f1df924728dbf57bf

    SHA256

    3920d49d4affda145d4c37bdc9cb08eaaf75c3e6e67e60509a82346fa0e49a16

    SHA512

    6b2183694854cf41a712dc42764624cafb51a3ef16b9f8f66d6c6cde495c2cea8b085d0b0dbf419b86f0418b9f48d4e9fc4e86b8124b660f2f4d361ce6424c49

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    19630bf729f58cb5e8f1409f10e7438b

    SHA1

    5c540cc9c83ca68583cd2f4fb45408c6ffa97f04

    SHA256

    dfe0e544646a2c17a0271efc1a7ff7406a29fa5d2290d40871fec4177a3b1521

    SHA512

    bf9494b45d21f80f1a3f7b0e4fd0dc3b6a32f9a6b16d42734167886fde28172521c42cf36285fc2bff43f219bfe9a6ec592b02ad8a52ed6b7b737c514da408d9

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    19a44e44bc39646351e5928fb60c2b8a

    SHA1

    285c129502d11c2487ed7dfdc66e61c0d9430c7b

    SHA256

    c5aa6dc11b25e2df81b76beb06998f2e3256f03314f76ac4abe08a83e06093de

    SHA512

    e5490cb5e9167074df054f15732818e921a31776e90243c222026e1d1097efb464cc0e65062d809369556f307de443a76b4990a47733468cf23d0dc165597f02

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    5b1d3f4199643217a92228cb8803ec9c

    SHA1

    c7530697b2415e22af4b42a6fa45d19c7fe9310b

    SHA256

    0e375443010e7f856158cdf289b191d67319b3d7dc4892eb51f6ade3e60ac3b1

    SHA512

    f837d7909d922dc48758363e86ab2d9b582838ec31a56a1156fc420e5a3ec1d2f0153d2a21a003ec19630ea032a821dfd7e66f5951f9c03752536ab6e8647be6

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    5516d89db23357f9bd56c8817287d1c3

    SHA1

    2399d0813ee45268bade705f90c1f826d5d727df

    SHA256

    fd6bba12c8d2889cbc189cacb2fe5826ccb35d0a4660e269818d9ef27f4c6838

    SHA512

    9e525904b437dabd7daadad537bfdeb005cbf77bccfa1255cd792cf243a8c548f3e307eeb1c61404f1806c283c86d4aaaceb0f6c190b9bde6506888714b3786d

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    4f152f521be9bd0c497b5550781c55bf

    SHA1

    92c33d7264d240b03836a55ebc1a7874169a508e

    SHA256

    9309365be06f3c43ccac2109fd9f609146d33ab26d2f7d2d3d09ab1fe29db0d9

    SHA512

    f9a5f544f8fda2f0654123c6969b2b88dac3ef4c815bf2d337c39ae76836a463bd65700da8d231e18fbeeee70d25e45f8c1e8418d697ce21d9087535b2c10963

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    548f818f526f53af7951d575b330daa7

    SHA1

    be5ef43acb6d61e62be740a298de1033d5ade0a4

    SHA256

    d719a8aa21318948ec87700c3601c85b9a3a8b3eafa8fd689c4d13bd708c81c0

    SHA512

    8036f86982af8aec41ebc933f1e57d6a54b042b062203df12c7203e7eff75b8cc10d68ac9a3cc41abd13df75665298ed20599543847b66a8ac8fb4219ce4c071

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    d8bc824464da6a532982213a49e2c10c

    SHA1

    a07bf38eae0939321c47d9921528cb1257d847e6

    SHA256

    11f2be634c486fd51cc5ad1b85c761aa4dd29bd6e4b7060c1c50c5fb432d8a77

    SHA512

    09c2f06042ca01477fd4ad045281dcab60cebccbacff8024fc859419484a525b4883a441fc26284f78f9c69256011b0722cb002df70e4383efbc506c88b0b3b6

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    e499d5e3f2624a20ad2ca2815707fe47

    SHA1

    6796ee381886bab01ba952705f8549896f161d98

    SHA256

    1b659e7ee2e6f1f7bf077caa3aef58640ad2d1a2e3e9ff342217bd608125c2c6

    SHA512

    daf73411f064a9611fd30cd6e297ae45e25aa63025ef395b74668e7839e24b668f92b4587efe9fe3f645d7876908385f97a636c03db79f9c09c4b0b3517f635f

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    ba604643d5fce6f62d2d904aa79c135e

    SHA1

    0c907c8e5439f5603e453b4e1ff2bdf55f1b6d74

    SHA256

    6aa2e20355d487340ec035c4a0542d55f4ad2e186cb4fa698ac12f3676aaaeb5

    SHA512

    1af4e2d51f95e7f43111d56a5ce3fdc6f9ad0fd6d793d0274c776194f1fb481114fdebd1a244ff08de75313fa7fec5866335764e1b36c8393455cbc15c11c94d

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    f1a2e0783b7c6f260f8454a65f999de4

    SHA1

    a39f1fb3382379253b10aceb539cc12a6520fabb

    SHA256

    8e105b5f2d41a16855bde021f2b11eba406d565012e424ff32994b35de6d9f68

    SHA512

    4783587fb3a34d2c65b4e77ca78fa2b5108f4c5c3bcff17db4084f0e7e9458d1b645691a839b0799dbd012913306c4c532f321358275f11fdaeade30a5513acb

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    ee46e3b7e629ff10729626296e5d6c0b

    SHA1

    0e7cf4956117b489145be0a6b0a0d3d0a2afc418

    SHA256

    6321efe5711139819c0fde35836ffd0c321cd09de67c113f0ac73f2173f30583

    SHA512

    7778559d854bdbf9721e18678608803d147cbcbd0f9e5c3b9219b74e5186f2c87d95bc0bc19aac31103892751b71de3f99fdddfaa3601e92d382b0a746ed36bc

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    b3be34add9955b4050eeecbdaf1fd47a

    SHA1

    85fa4d0fae27eef150e96e7a5406b747372937ee

    SHA256

    c81b3dc8bf4457890618bcd8e029afb0969507c1c933e77d7822d7c67e9ac85e

    SHA512

    5bb0e40343c4ce4869bee531a3767f2fd114cabd28e3b73b7d7f255fa0970116177fe5c560c45bd945a852ee0ad83d39c4e76d31238524a10873a622b8364d9a

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    d42b53fbd4c06d6345b71bd4161e234c

    SHA1

    54ee4a36092c19b8d559fa8a65cdd1270cd0a2c0

    SHA256

    f9fc287c9062b73a6113231d3aef6afbec6da914bc2b93cea49a56ae4d7127e8

    SHA512

    98e52ada669375373489697bf1636e3b5cb52e93adbc2054610f9c8f67cce56710ae6ba6398d8a2ba969f23a3d086e86fe51c5f1a75a15cf8d292ee081f57e0b

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    f780a732d8a4900ce07115278c302f73

    SHA1

    d1a0f9f7f785cb5780240ecd971460591f0d1e7a

    SHA256

    51d987b9738bc8426cac3ab3e1336fc6eada303d0fad53de5eda7186c1125490

    SHA512

    060e8963736085a129447712215232b0c84fb97db15d4daa508226ca47d1194d9217992a1bab9c03a63e0fd99a7c9a66a6f970bc6bf208dcf26399304576db41

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/1004-215-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1004-230-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1144-174-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1348-213-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2072-296-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2072-285-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2356-214-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2356-192-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2712-402-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2712-255-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3188-246-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3188-233-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3388-399-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3388-244-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3388-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4152-254-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4152-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4252-287-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4252-109-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4460-236-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4568-305-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4568-297-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4620-286-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4620-403-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4732-283-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4732-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4760-284-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4760-245-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5056-303-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5056-294-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB