Analysis

  • max time kernel
    149s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 00:55

General

  • Target

    d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca.exe

  • Size

    488KB

  • MD5

    408124fac57fb47e5a962f0351e0546e

  • SHA1

    a992b643d319612429f7a26fca87ddab71f49a59

  • SHA256

    d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca

  • SHA512

    9a4d2b4c9f1f38f70d7095eec7e093d9738693191aca8a6cec29c95493e6305dddb55a302e178d77c72a34a57a4c8f027c998629209e1c23f9f0efb905963661

  • SSDEEP

    12288:V/MZ/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:ViK2O2HIBEd7M

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca.exe
    "C:\Users\Admin\AppData\Local\Temp\d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3988
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4404
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2036
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2616
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3804
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:720
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3832
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2916
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2904
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3212
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1948
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1928
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4400
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:424
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3156
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2352
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1476
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4864
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1672
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4548
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3576
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4376
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:1764
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4916
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:628
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2360
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1956
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:784
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:876
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2620
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:752
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5040
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4952
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:640
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:972
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:32

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    f0adcad900af219b4b5f103d0f070fb5

    SHA1

    2a4165a9fb1dc5a3fd8d897f5f780d6f37296ba0

    SHA256

    ec7679fa58e36384c798e10bd3e22052afc75f82cd19f5cdd11b8897146b6574

    SHA512

    dc97e66a56f40a76ee827fd44acab00ee1f285083669fc991dd5fd95aff29b671d9334a3990062787d35455116cd4d0568dae380a0b50fa123e7c21636a727de

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    fa7aba43397e4cc2b25b251cf59748e3

    SHA1

    3a52ad9bdf42ce398e5d8a9d81c82e48cf9d82ac

    SHA256

    5e0054edbe630e8f60a8015088f44681e7082e5c90c59986e0853536c4d7120e

    SHA512

    a2f466c1b5d838499cce3cce3df6cee762736cbca65a52de7d3f33eccb094c7bb866862561a1ac5769dd6c0ae95eee98b1af386aa49ceb640eb6b98b74faab0b

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    031632b1f0b50aed96f28eaddd09da80

    SHA1

    682216c324e502334c04b8f306f8238589bb053b

    SHA256

    4ceba839ed3e35b81036d822e0b6977f797d1ec2f88e4dd3685e2fcb3f127558

    SHA512

    23d313b5848cc4eb1f30d1e2c699f00ce25a8c652edc210ee79b5e663f7c1c6084f26039969e3b87f9fba8401e79cae32b6c672699b9320cadcf7a797b878c95

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    b3c45f22a5b03c10d18eb52cd0ac2bd5

    SHA1

    c269c4cda1d797411a5acf661278fbcbfd94d659

    SHA256

    1bbb9991bbadd87dc75b386fca7bf604b56ae4bd8e2b6c7b82accd4251dfd37f

    SHA512

    867f180b5edd27108b7cff77f1e9bd4f4ba584c54e8a9b0632f5477b6e67090afc4d6f26c94dfaebe9cc67e31c6f721a27b712459caf652525bc9187e535aabc

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    1d2b42fb892f99edcd814679ac2222f1

    SHA1

    e0064092ac76112eb89e4a4c39deb5b9eb2acd81

    SHA256

    ec9ee5d750cc694667a2e6d62bd26b33ef5fe9bcfa0857c2f47f2040c5eb1845

    SHA512

    87d7b01a2d6b027bb0bb71b9223c9e7e472b8879831affcb2a9deaeb7cdd75fa5f37f38a2263580bf68feb0e75a13cd63f62f50634b48e3a8e878a6c9e6c8cf1

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    b7f05cfd016de1b7b6091daa188243fa

    SHA1

    078bea680fef3180892a8a6dc7f005569ab81645

    SHA256

    8fd206769299710ad70274b4e6aa44761ab7b39d8fe209955d86ffa9a5446446

    SHA512

    db917eba16b0bb0193e2f9b3c960804d9c58393d6295bc228ac08334e4798108b3b908b53408f936a64110858f69b415cbb4569a88ee74753a750ac3896d7466

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    8c0797f680184cd8ed8826148f3d271e

    SHA1

    360da9487b22cdfb2664da126ede1bf64b818908

    SHA256

    ca3565a24439cb06011302ed2648f69ba9d3c41303c3f280f3911e1ce29c6750

    SHA512

    2432a58ff6d7243dc17801991edad5e759ba38e5bb1e48db6a1893dcfe7d756b84b9a7dc939a129ef195b132c7dcb24078a0b09279bc4e8f9f1b801ac2f60dc3

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    43a970643d6ce2a927447aa612fe32f3

    SHA1

    1f570afdca3717bf14f9145aff80c0549926f52d

    SHA256

    6475e416bdd344bcd9d47c3d57f55f04fc234e819673cf5d1ca1772b5b740166

    SHA512

    2199bee8d7e95889f31811d548021462160a0ba11e66f985cacfc4ce1d7dd235fad93ae413c63532d03ba492c2f41a5385839c517afa5da42192c5ad9c67c1f8

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    92f3f50f303686eaa79908db01b7a009

    SHA1

    312f59c0ea071c84464d814cde91456e0e614bdb

    SHA256

    6c7e107763dc1b4e08b61ebf6a90a754ced490c12b1ac66a9e9d4576b5b66ef0

    SHA512

    b71356a5043cc6a3641cc577d4a5c58280a12f287b4549218c02663f56d047ae8bbcd36e222b172b062e90a62e1145ea67a418345fe555b38a9a6064a9ad9e98

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    4e44551a0f4eebd77cf7e26751091acb

    SHA1

    2168aec20962289dfe7638f50e438111b6e7e2d4

    SHA256

    af0168745bc708ff9dc3841c87bb1c975e8b6c01100aef32388011e2f28e4bea

    SHA512

    47897f3cb0d5edc7738ed162efa4fa79eb29cbb001911c4a58a3a137a6b919f257c2653751c346e788f9077e6edf07cb95a064d09438998fad4330972074c349

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    9b4d3e1ee276ba99c3eb956ea108a6ac

    SHA1

    80d2bb4404bef14fc5e026e244a5fb129b974006

    SHA256

    fcb3ce350ddb85de3ac4eacf11648597d6371734a690338944674f4791430c82

    SHA512

    70e59bff592bcc3c82aa0456c28d267efa25cde3dafdaab8cf0eb352b97ca4d860678fb9895d5792bed87002f2dc21dfe83f2036050eb6be078aa0a8cafde5b5

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    b0eb1a60f2e7318f14befc5adea1a444

    SHA1

    bb6f7ef1e20d53f6e0ef80e5e795cb9f08427b45

    SHA256

    84e5c500d84a60fda3b795e0e0bd5a79d8987263d9b6571980e7357ac80bc4f0

    SHA512

    3197ed83c189f01211e7e88994ae3a61ac1daffc91153866511f95dd1187ed85f688c23d66974fd782fa03dbf36a846ee7ed37f1a97072ccf238de54fcf1fb01

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    eb2b61ccb20321ca7b6b4da2fadf9688

    SHA1

    4f1b6e357fbdb0860a17130f432e8c1c6663b0fe

    SHA256

    46ef540feef08f51b8bd5ce80ae98ae80b66832097fa67208f78947e7cb4d300

    SHA512

    88e7eb5d82dde32c9ccf72406843650948bae914f721c3c7bfd669f95da3fd0d4aaf12de706e2537552179af8fef813a5a33bb95f4b9567e9c36c96745c35f82

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    98efea29677eac51f3b01e26f226f4ca

    SHA1

    563de6ac3bd9a9f96da91f46f648d2b14561d737

    SHA256

    927611ea5914e1e66897b9f803821d8b83bd9db4e0a7a213cf69ca5eec04ae17

    SHA512

    d7f462760b7f43222237d51ffb02fa1f21562f52cf270c944cd2120c07cdf728f42ed857abc17376785758114b889b20a245717672daffd17073e65e1c2e6fa8

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    739feda7e0a6e4b8acb68061eac56a91

    SHA1

    cbd855cc71fa869ded84baf94f86806270fa89b8

    SHA256

    d7aaabba7e170fb662b145d2102106fecad2642f8dc27ce9b9454d7894d68166

    SHA512

    dbf4c95201a6cb95e05b8fbb2187b4643258f63295654b84a912d43742f20d81230eabacef1462d10968557e89a9c3ff9d005e1b1efca793fd26efd048a58f37

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    408124fac57fb47e5a962f0351e0546e

    SHA1

    a992b643d319612429f7a26fca87ddab71f49a59

    SHA256

    d89a5683bfbcf6feeccd980be0229a12e32f912007c2775c830d90d3d42877ca

    SHA512

    9a4d2b4c9f1f38f70d7095eec7e093d9738693191aca8a6cec29c95493e6305dddb55a302e178d77c72a34a57a4c8f027c998629209e1c23f9f0efb905963661

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    37986c2561dcf3d7d9879097505ce072

    SHA1

    619612509334fed0185175a27ec4e755f7214f74

    SHA256

    64b3958329fa2ed03a5cf4bd83295038b1ac69d00bdf6215a2aac812575b5072

    SHA512

    b8ff5247714f870fadece93e81739140e9ed29c99bfb26fe2ec36faf1886915194d95c15fd1f2e0ad3ad5d1a47bf4a6d984ca84c4ba7405f8548b6131b2e1f49

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    b73fb67a8eb6cff83605654d1a5abb6a

    SHA1

    a4e9ef579f515c66002c6e96269f623cded6c198

    SHA256

    8509b494f527e62e39d8d5ba3a0b89ccacf56e8c3ba1aab97a93bd6bacd05f6a

    SHA512

    024b8aff02775591912d8d3191d452adedac7f762db547f4ff5824dfb9554ea4f4d80e27afc7a41d274f333c1891653f5a9a1d3d3990c1c77cbf7f27b71e65a6

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    df56a9fdbef6054d0f9c263019976871

    SHA1

    bec181a5869992e7b15f457a370c0e8ada765160

    SHA256

    9dd12cb73aea6597aa2abff785142fc6b59a05fd3b5c9732481fb89bf73dce69

    SHA512

    5f212444e0350fde97fe2a5e206e1e8bc03b243f73c9cd272ec8a27e8bd1b0d1fd8c96bfbd33e4b43d20e19a7b9d1e66a2f758d6566f76ceefac90c56e96b43b

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    f9ca05a0ae73a80d4d98704a6a8650bc

    SHA1

    a628a3395bdeb8c46097ea14efcb1ba6e5b7b187

    SHA256

    cb24689c15b2e6140bcbb4347f9f54c973eb85fcc4155754906eeed5afb493c0

    SHA512

    1dd20ac09e28ce95d9790991778c4ecab5ead9d54da0534030bb32d9c504682c92a7228dfd165e985932883ddef3558184f03a6773470ab682a6b12783eb7817

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    f67b99927796dbab76fdcf0a0fbdd4a8

    SHA1

    298b1c8b20aa1a7bd086e16ceb72e478a66a0569

    SHA256

    873d1fae4ccbf6e27051c8dc20530b492baf83c77f6b45135cd32268a6433687

    SHA512

    ff3c6be69876575eb2fce14e46fd6a0b82623d3380f78854f262e520c04d268f03536ec04b363e7598c4caa4879d168a4e59c3c07464fea54591c74b3f97bab2

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/424-273-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/424-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/720-331-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/720-293-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/876-411-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/876-292-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1764-272-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1764-410-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1948-300-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1948-360-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2036-193-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2036-210-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2616-214-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2616-221-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2904-275-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2904-263-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2916-269-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2916-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3212-276-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3212-296-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3576-215-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3804-281-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3988-261-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3988-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3988-366-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4376-262-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4376-218-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4404-264-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4404-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4548-163-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4548-148-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB