Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-10-2024 06:35

General

  • Target

    9634f5c9bd619d2b7cc20409d3d88fcaded8af9d608a6238bb783ff9d749f0caN.exe

  • Size

    351KB

  • MD5

    8e3bec4f465c89a6243c457c92000d30

  • SHA1

    395bb5624d25b9d9e6ec040b4c733d6e8794c018

  • SHA256

    9634f5c9bd619d2b7cc20409d3d88fcaded8af9d608a6238bb783ff9d749f0ca

  • SHA512

    71c452941343bf0fe67258bac71515111a47c634cdb8ee700f9f206130a9c52406d2ed9cc1bebc0198f44e3e7a820712937a0326e92f69c81398fe324194f389

  • SSDEEP

    6144:V/OZpl5YZplx/OZpl7/OZplx/OZplQ/OZplU:V/M5qx/M7/Mx/MQ/MU

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 7 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9634f5c9bd619d2b7cc20409d3d88fcaded8af9d608a6238bb783ff9d749f0caN.exe
    "C:\Users\Admin\AppData\Local\Temp\9634f5c9bd619d2b7cc20409d3d88fcaded8af9d608a6238bb783ff9d749f0caN.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2224
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4020
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:916
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1288
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2280
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:3020
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2092
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1276
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1028
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3664
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2172
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2456
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4480
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4804
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1724
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4464
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5008
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1220
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4216
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2440
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1996
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2864
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3140
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1852
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3444
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4724
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:540
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4836
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3936
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2012
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2412
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4928
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2488
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4872
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3040
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    041ad8e685799774aff58975af6c2a2a

    SHA1

    0589ab8b369e4ccb4811bfd15b7d4cae3f15cdf6

    SHA256

    c4a1071744fb021873c8b32b767e8e2ed2dc7fcebe1c7e47dee808afbd46eafc

    SHA512

    c90bc21e28bd09bfabc83b3d3aa2bf72e820b271d02399f1b0fbbc31027591cd2460dcd7397e96ef508e3a6bd1c9409fa20094d883240b2ad638cd0f10bdc007

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    351KB

    MD5

    5a5151f83beb98c96cc4299305e98ae3

    SHA1

    1fdcb4784a9989e822a3a12ab9a97878c45b3603

    SHA256

    2121477e64a58579e94d624bfea763f6e8a236d12ab163bf107cb95cb9b9f437

    SHA512

    725d015dcc39cc68b0adfb6d650c09a4eecf65e9be372278bbaf14a94eb526a8d0ea41c7e5e7d12ae236cad390c629f9724978d7cb62ed998f7eb0ca3add8fd9

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    a482e82554043732bb2195c67eaf75fc

    SHA1

    951dfcb2f3b7e03724d61a70fd2ff2b4c4cf549a

    SHA256

    8c5ed9c332c0f35f871a0074d6b8c6886e730d532d6b2126f0e38f98287b7cde

    SHA512

    1e2da4bdcbfe817783af8b13352362874733282a8410341f47caed3e8834beb03e52603374e7e52072abc3cf66cfc0004182bca90b5da1fa69a71ca55f7510b9

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    cb5816dd1dda2e835c7134f4b2e13d33

    SHA1

    b963c767e727a7ec7ef0ad6ea7da33c93b6d7341

    SHA256

    38bcefafdad80acae39216ee541a2753a28aec5474138005bdb8100d88cfc883

    SHA512

    b86a985fe0219605549541a14130a32abbebbbbe62f86c4218498ce2282c72b60319854810255292d8945f1d5567018c374de6fac6005c457934c4ea369791ba

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    351KB

    MD5

    d51bf625ad45ff1eed64841d6cff1507

    SHA1

    eefbebaa414ff215b977cd443ef6111d39183086

    SHA256

    b6d06d62694bf89f857c9e1a54f8ea9943d7900b7be9f40fc0ca54e58a87b75a

    SHA512

    f3c69cb9aec5042b6ec10502f6d6efaed79201830f82fc0365502f0390e5addabb60a3cffd2650d969808c9a9d82c863fd6a8f756c8bb03d1db1c684b63f1b24

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    351KB

    MD5

    94abf69b1a46b79f33312684ace0f4ed

    SHA1

    476456843267e06c2cfd40f5a468185ae0c32969

    SHA256

    00bd779c48e6c17ce39ee3dbc5bf70c617b74b6877c0bea4fd7a5c9a47dcc252

    SHA512

    2b08508efb2148e595309606cb5c23f03dedd46419284d8bd0957b7537e1e551440890a4864c441c24e25c0832503afec39cc1c20a954aa631743fcf0966aca6

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    351KB

    MD5

    32f3d9c78de1f6334b43e1595f4a23a5

    SHA1

    ae7e78e1de3486a64efdbb085ab3aec8e5f5e2c0

    SHA256

    6e057d1d283c25d0784383c596b1c2ff3951a5c9df882032d354d205d8eaabe4

    SHA512

    08d4eb0bde80b109cc259aa5a17044ac2f7434e850dfdb42a616b9f15b789b0c3149982d92da38043dca86d861e58786780a908e59b9741185adb62a8761231a

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    351KB

    MD5

    6f2f5f0d2b916a8a13245d39406af410

    SHA1

    d7fc348646071184fc68be7fe5c85075f8bafaf8

    SHA256

    7f9bededa977edf6a5ea61227d7ad29fe76670f5a587eba55cda12837e44aca8

    SHA512

    1a2ba3cfff09b370b59ac4251ba75f0ddfd123ac7be2fc110a1f9c3a69b65a9bfd105346f0cba76e68293de6bce4762f75859181e03fdbe9df52f057e3b25db8

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    3df1359ca86141a946a2aedc1840538b

    SHA1

    748726230bfa3a6b541ab5f9e1e393a37d7e4c60

    SHA256

    86f18a75757ac1ce7b405e8301c6bb543440a16f1f9639e03f19ce48a64d274e

    SHA512

    b11be1f97bd41e5b7e4aee16789fb58f7d959b5598c11764f3b0680aaf935f9946e2c52c988c5e55265c3708fb3c52071e0d3db91224f1e4326649a1daa74679

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    b833918197f3d16c50def949fb5935fa

    SHA1

    405ddbbf5989765826e48b2b746e952fb48a0010

    SHA256

    4cae9afdc76bc276b16863e31a873c65a76401aaf950c87c9c5128abee9cd845

    SHA512

    bb74aa2f87363805ff77b65354d7c6a4187a8f7f1b8bed69229488bd84d8ccd47309a4af669cde8b84b32ec0cad78cabcf56252058be4e7447561bac9affd381

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    351KB

    MD5

    97374b7e9242e61e0acd9dc657d6185a

    SHA1

    736547bd03ab1140d3e1bd4cf50c8609cb4635c1

    SHA256

    335c789849073ebe5f9dd827e40f7bbf2548184242386b17f2342049c65d98c2

    SHA512

    7a483e39f288d64981ae1749b7354eddfe3782ee2aa91d70098838ff20cef9f6884ed9a0f2855c81ff8287ea1eb26aa7043ecac17fd835c3903629e0bd2a43c2

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    351KB

    MD5

    ad92eead313946c0ea45fb7b0923200e

    SHA1

    9db4ec9cfe3a102d30b066a00a6b3403de46b8d3

    SHA256

    9bf16d38c0ea951221d83f0caeb5ba694608727a074cbe18a4aede7283982ceb

    SHA512

    5283bb9659e84eb17e1fb4d5363bd6ec9af4b579a97f290d713e5522f3b915cc5a5f480ba4d1360870794bc4e7ab3b8126f6cfb178caba72203ac36b25177f27

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    351KB

    MD5

    67e20c127049f9e47c6f157a46edc69f

    SHA1

    998466247d18b051ad20a9f00753fa18d4c51f71

    SHA256

    d63dbef410ad204654dcc79a295490a483c0f8e0df44657a57934cfd8bd266a7

    SHA512

    c87522515361c6cd0273198590ae5852d1235e850a8ffb0285c4b36573a5f15a964cd3f8521e5df4df918cd4aebef03c0b796327495bdf4c503a62289f7a8f09

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    2288710adaafa9c7c9ead33212e57edc

    SHA1

    ba81fdfd2ccd4862b03d11edb74e9f03d0bc58a7

    SHA256

    508f7f151c9c632e1b91dc46dd5abb7bc46b4fe91e764e74a82dfbfec610b409

    SHA512

    662234201747ecad56f738b8b84f2c185782beba3881ca77891b33849498428bad9b73fb7c00a90bdcee97c753d8cea1b736c6fd8cb56b8c7ef827c390e56f3c

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    351KB

    MD5

    8e3bec4f465c89a6243c457c92000d30

    SHA1

    395bb5624d25b9d9e6ec040b4c733d6e8794c018

    SHA256

    9634f5c9bd619d2b7cc20409d3d88fcaded8af9d608a6238bb783ff9d749f0ca

    SHA512

    71c452941343bf0fe67258bac71515111a47c634cdb8ee700f9f206130a9c52406d2ed9cc1bebc0198f44e3e7a820712937a0326e92f69c81398fe324194f389

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    351KB

    MD5

    8a0b9efa9421417130aa379aca2ee513

    SHA1

    b05ddd86c8d5f69d14a4a5f9297090a6e4eb3aad

    SHA256

    fb598557abd4fd12a68fad757901ae6e8cf60397ba19fa423e10bd92ef0c4154

    SHA512

    e0f62fd6b6eee61f693c6fa3a2038affee0fc683b1eecf49c04cf12955a7c7a3313442221d01ee552ad0be1ea9c5b466b72f62e05c05c7918ef3873e6b676aad

  • C:\Windows\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\tiwi.exe

    Filesize

    351KB

    MD5

    ddf2b8e003aeeb9df1140e68daae3759

    SHA1

    3ce1e6f3bb499cad78b61f11f625310db001fd2e

    SHA256

    5de43a3a30bbfe1c3d777ce58092ff49903567cc8e1ea75e9d0d8fa308071e02

    SHA512

    c1390122e0e4f0dd3194adac5c138b381f8167dbc7ec93129e05dc35fed2a61ec17b663fdd02e2a25b9939c82fd030e1488ef474531609e6e4aecc10dce76a24

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    351KB

    MD5

    63e6364bb14284f1799edf87530f73a1

    SHA1

    37d0f125efe8945cce12d3dc7c2c1402aa357f6f

    SHA256

    d118dfe3c41f97d287cf696a508cfb73a6043b764a3634f8e3b00c8b19164d60

    SHA512

    dfe4ab2e7c0d2e610c9e2929c492a45ea41bf06f4ea1444fd2bdf1a85bc1b25d1628b2628581e71e165cd984bf3a7e9834d06d1020fc8aed4241f8286ddcbc2d

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/540-291-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/540-238-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/916-187-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/916-195-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1288-230-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1288-198-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1724-312-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1996-311-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1996-302-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2224-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2224-285-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2224-380-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2280-236-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2280-284-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2440-287-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2440-298-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3020-419-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3020-301-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3444-148-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3444-200-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4020-290-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4020-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4216-303-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4216-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4480-300-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4480-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4724-201-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4724-231-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4804-299-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4804-286-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4836-304-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4836-319-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB