Analysis

  • max time kernel
    120s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 01:19

General

  • Target

    47431aac78883078912d4cccd311cc7d5d95fa6a3a04c6695e65bd08d8eed714N.exe

  • Size

    384KB

  • MD5

    38e3ae7675915905ddaa22ab49ef82e0

  • SHA1

    ca280221c4dd590270d54b1fea65dc6030c7cf6b

  • SHA256

    47431aac78883078912d4cccd311cc7d5d95fa6a3a04c6695e65bd08d8eed714

  • SHA512

    8b41b3acb8dbedbd5f8e276c2e8c632d74dbc756e55c992aa0417c3c64e1155fef77be78bd1b14d8f3c1675a1c8358585193a94a19abf7d970feb94aa9a9cdd2

  • SSDEEP

    6144:V/OZplEv/OZplP/OZplx/OZpl7/OZplx/OZpl4/OZplpBE/OZ8:V/MEv/MP/Mx/M7/Mx/M4/MpBE/h

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 6 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47431aac78883078912d4cccd311cc7d5d95fa6a3a04c6695e65bd08d8eed714N.exe
    "C:\Users\Admin\AppData\Local\Temp\47431aac78883078912d4cccd311cc7d5d95fa6a3a04c6695e65bd08d8eed714N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4004
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1228
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4420
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4608
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4468
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1632
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4948
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2992
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3268
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:528
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5080
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2996
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2900
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:216
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1968
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4144
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4228
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2752
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1404
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3488
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4708
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3644
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2136
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1628
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1288
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3196
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4556
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4992
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:388
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4316
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4440
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1144
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1596
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4800
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3616
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    384KB

    MD5

    bad034a568554cf42affc9be2d6fb31b

    SHA1

    6ed8fc82eda49b5b2c97e5fed6d006f24615cd3c

    SHA256

    b417b912d293166fd16ee3f04d1156a68889e8d48a90d26e6b4b6b8928395d9f

    SHA512

    ac15d90995e4eea4b327b8d46178428589f0e9b5d46194d498b53f1855e140bd96ef47165060ecd0bc5845dadfd8732f4ee1b51ee6bb8ce09a5cae89f2068cf5

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    8c09fb677d6e5e210073427e716454e3

    SHA1

    685120fe0ad100a48016a9c1648fd67e2c24814f

    SHA256

    ed54ac5d5ddd8a061a8e7e6e47cf5a5e1ce3c5502ee4363dfca40ce1dce5b6d6

    SHA512

    b5a8bbed0827fc1b3f9d39483966c63661bab37196e15da67548654bcafb35c5bdb739d432b21ac0152605bf9a76cf8791be6c6e83dc2cc7d0469f87c9b82620

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    384KB

    MD5

    b86ba8c99fe78845cf837075961357ed

    SHA1

    09299ae936f027dfa025d452c4624179b1eccafa

    SHA256

    2269cad3d90014086afd14274c09786b24d71b7f3ad9e2097b77b757ba8e1d58

    SHA512

    f35553c26344ca48ad2287893446323460234250c5706de0daad279ef052310b799c909afb5b343b9f0535b2786e4028c6b6e47d530d9c43ad5ef82ad61fde22

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    384KB

    MD5

    f9ad85e4344718d0ef69be1a9fe3416d

    SHA1

    d999e448beea03f563d753b3b4e41f6980772611

    SHA256

    48ddcf17dd91a4bd5bea3643e51ca75a8416ec3c6b5b4450e92ff2bbde06878a

    SHA512

    2f1f1a7e5ad93eabf9b7d454fbc1d92b0fbeda3307b87c0e658aa3b92ef55019cc3e05e6815736375da942bc939f0e4cdda1e45bed40b67167a6b347e34e82fe

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    384KB

    MD5

    0124a129b7ee5868fcee230561ac3f34

    SHA1

    c506b86fe2775d05b46028b274ad7ade4f040800

    SHA256

    6bf90cf6e19470976ecf48e710a91b8162ee5606cdf49dc68138e0fd0131ac43

    SHA512

    cefca9b190bf6463e89851ecfc1e9619a9051caf961f6e4ea46541e462b8f57641a4b8ca277fd465085139c1300683e3153b663019888879472196e9a0bb376f

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    bd748a7d186e2c70fb401345558094d8

    SHA1

    cd5c62f8f4068501fcfdc9f22d8d763b45d84cec

    SHA256

    5b67dfe197b985b3fe5b77815c102b9598cabb93a045d8c6d5de80c90f47cb41

    SHA512

    9b3790afe10d4489a76ac56b4de46c780094a1aa20381f59551c0d77c105ff0dd430bf0a615510a50484c56fb0074e46f806cdd903b7695c3b58656c41d189a3

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    3cb54e2054a30c07e6d7013ad8a807bf

    SHA1

    fc46a48a5a379ea637588d64cbf627e3f64c97f3

    SHA256

    101fd5652bec58a103efa7c8e6ffb3325b45940991e91c41b218328e9efc53ce

    SHA512

    d6b873cdb9356bf2294ee62a0fde88d129af3e2509848b609b6ffc55c67cfbe2418c3bfb1f248230f44d62eafb8356a6e6aea848883783f6c546dd1fa4ea3b70

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    384KB

    MD5

    35944eeadaca1e13b2b49ad83053547f

    SHA1

    f29af7ce462a0c5e47fedf6c75f2df6fd6a8bc80

    SHA256

    e9c1936b48eb3e8117ba17af614da2a1235eaf76a52cc0bc614b77cc6cdc8402

    SHA512

    7a7c3462f1f8a4384c15863eea4ac9369a3243c0898b900aa69d807bbef2e00517a11f43153dd2e1a871df0e0afecc7a3b8aa02818dd15d333961b698cef1927

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    384KB

    MD5

    2e117d3453ddf2574f9db90b84a8ff39

    SHA1

    ee7bde4572826f47cb72cd1101e33d7a31354d39

    SHA256

    8f58a8e59bbfbcd79a5466c41168da4c4ace033ed89055d8a0da4f5fbeca6fdd

    SHA512

    beeef5a49da510722d09d7066abf2c0805569feb8f395ba3785122fb893edfabb941181dff3168e80b8cd62cfc7a7442ba99d7e8ff8a892b0d6e8544714c00f9

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    384KB

    MD5

    417160f23188f6d8d94c1e3f65f2f954

    SHA1

    373a24833c28c343f69ce6770e58a3be1ccad293

    SHA256

    1895b8ce383073210e1184919033f2d43e98c652e3510ae160f1fb44e75319aa

    SHA512

    d95de0188fb413ccb17b38a75968246da3ac7f56d6e98542c969d26c8c6892f9cfd6cfc804abd517b5a2730e4eee8bcd20ded5eb41590565894cee7481edfcc6

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    384KB

    MD5

    8634cfc28e6196271e2bf63f080b393d

    SHA1

    cb8c85417eaa1db68513b5d286ecb2b7d4289b60

    SHA256

    614f517588d94bfc5b290b867afdcc7a6bfb02c202fcc08b42215e5eff78dbdb

    SHA512

    d2a8938f515bbba36446349d96c13e84425bd7047ae59d3cf18bc63409fc21e2562ac022d4329b2e1a90ff05a972db9f902a5bea6e46758b930fd45ff0b99d42

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    384KB

    MD5

    16b7bc3a78fb1857bc848244ccbbcaf9

    SHA1

    cac9058be20c6a418c536e27ec3cdcf5a205edc0

    SHA256

    d22ed46864aadba9fef9d5d4ff3b570e8188bf3809281f2631551bd72be4537e

    SHA512

    54028699e553eeeccfb492cf2570e9038d3b35838edede288cbe74a2710a03b9a60f7c4bf0f1f0991cc72f747802ce5e557048762e7e51a39e6722f51284b89f

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    384KB

    MD5

    38e3ae7675915905ddaa22ab49ef82e0

    SHA1

    ca280221c4dd590270d54b1fea65dc6030c7cf6b

    SHA256

    47431aac78883078912d4cccd311cc7d5d95fa6a3a04c6695e65bd08d8eed714

    SHA512

    8b41b3acb8dbedbd5f8e276c2e8c632d74dbc756e55c992aa0417c3c64e1155fef77be78bd1b14d8f3c1675a1c8358585193a94a19abf7d970feb94aa9a9cdd2

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    384KB

    MD5

    b83b517cf7a4545d23b33eeae2b0e6e5

    SHA1

    16f0fd10499472442fa448e4133807d46e5d766e

    SHA256

    dc25277a4de6b9328e093697d7518e2d0a6540ec01cb8c76d538cd10c83c90c4

    SHA512

    7aba57a64c0f4e0dc2e6d2dc855c8538e37f54cb908d6975fd8556f6c157f4a30e73392bda75386ef4eb0a496233256d0640c996171bbe618f331223b0533d5d

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    384KB

    MD5

    dce9ee3309bf0a5436df799cb3236aee

    SHA1

    557246838827c2df4cbb3b0b46a164b98ef9973c

    SHA256

    0386b2c7bdcd2fdd46a7bb007c0d6b87b0ca0fb01921b1a3cacdf470c407cae2

    SHA512

    04f68c6ad392e7eb403c3e98400e2701260391d193e18a12cc10afc9df090d7fce246c1174446ddba289ea2e1ddaf36dd9b7ad49770fdaba7c303870e706b545

  • C:\Windows\tiwi.exe

    Filesize

    384KB

    MD5

    829f9e5431bad5e40105821f2fdef5ff

    SHA1

    1131babf3ca7d83cbe8b56d3ef715f76e0eaaf28

    SHA256

    16452737e88b1f9c43abe9b033db6cfee445082e02a242e97c4bfea57a58041e

    SHA512

    327c01391cb02734e54eacd0a1f35484eba05206a31c0dc73800856343bc60d8bda05a9160adf9171b0a5e443187c36c12642421ed19ef7924c902c3349aa10d

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    384KB

    MD5

    c705ca6c3c6f2b5780dcd0f9d76bf826

    SHA1

    34965f5698faddadd7a9a1bbf43fd0c4df8550b9

    SHA256

    ffcc9f661ee0daeb990284ad9b532227fb20e8af5a50b343347fef624bbf0056

    SHA512

    366ada6731306af3c42fec828ef32c9a4a7185e7e83d19174bf279e05c8bc70528642f4e3dfbd3dbbda314e9254a9f03eef96f42cfc70645896ebca9656090c4

  • C:\tiwi.exe

    Filesize

    384KB

    MD5

    1913e5f57f28cde376e2214318922de3

    SHA1

    298d4e31c94c27f28a62059380ef2940637cb152

    SHA256

    98ec557ccfe1d8283aac6ede7d28dc6f244189eb0ee84b171662935034a68b3f

    SHA512

    d81c46e94396d7d439c2303a0df9ad2be8e3b0dd1f973f83453380ede98f8fbe2403a38b49e768254433ee62cc93861c8dfc676d3a653998f04d9a0cb74d4c08

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/216-298-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/216-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/528-289-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/528-297-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1228-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1228-287-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1968-303-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1968-291-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2136-417-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2136-284-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2992-290-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2992-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3268-273-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3268-283-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3488-155-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3644-203-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3644-271-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4004-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4004-408-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4004-281-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4144-312-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4144-302-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4420-200-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4420-193-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4468-308-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4608-204-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4608-347-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4708-156-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4708-199-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5080-311-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5080-301-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB