Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-11-2024 11:00

General

  • Target

    7c7ba94281aff39ec4a493575e394d76f3f198d6ecba8cc4457d41d0da8e340d.exe

  • Size

    91KB

  • MD5

    685403cb101fb109846fc08743c34d9e

  • SHA1

    308996254958dbb83bc768873dec55f7323fb35d

  • SHA256

    7c7ba94281aff39ec4a493575e394d76f3f198d6ecba8cc4457d41d0da8e340d

  • SHA512

    54235ae168dfd55721032f049eb876d004e1f4ea7704a99be46cd0754f6bac8da0b9adbe6598d873c4501bd6599a2812ec82688468dd6ce0c647e5b2bc44f8b6

  • SSDEEP

    1536:IFAutcCNS1mgnd2y1nrPlGiCcCBEulwhFAutcCNS1mgnd2y1nrPlGiCcCBEulwu:IpWC4YgBPlGiyllOpWC4YgBPlGiylll

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 39 IoCs
  • Drops file in Windows directory 24 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 31 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c7ba94281aff39ec4a493575e394d76f3f198d6ecba8cc4457d41d0da8e340d.exe
    "C:\Users\Admin\AppData\Local\Temp\7c7ba94281aff39ec4a493575e394d76f3f198d6ecba8cc4457d41d0da8e340d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3344
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3412
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1968
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4068
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3828
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2828
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1484
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3988
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3872
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:948
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3112
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4272
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3300
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1600
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2308
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:556
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3724
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2600
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4112
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2240
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2152
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1332
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1712
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4100
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4600
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2468
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2696
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1456
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1352
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1536
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\cute.exe

    Filesize

    91KB

    MD5

    45cfb0ed71a015de92e37ef6813b0995

    SHA1

    0482760a6b9d68db0b5ee44721485b4f19d458b8

    SHA256

    dbf27bd1c05fb4ab76540ca7972e3842e616eb0f2fc8f48b8798139cfb5125b5

    SHA512

    1e4602799723b3b31c9a6f78e2c6807222f009a48fe012b0f339ebcf6a59a3af55eaec2acd0d0b3e300064db6a1953e4bd145b94162fc57ef10b760716f94f37

  • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    91KB

    MD5

    7decb06944cf95d51dd77484cf8c173a

    SHA1

    b79857d69cf9884b9479c5a828a724db2af2ecf3

    SHA256

    a7882cf4b4f8bcbdd5a48b97d23f68c789e519be98b85ed02708abb07e44b9a5

    SHA512

    277eca1d2f3680b1a17d05b7b36c362d238a2a713a3237a8b3ebfb96bce2cece94042b7f6b86e7d9a1861681f94e4c61018228413c3def116915379ff562786b

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    91KB

    MD5

    8b3204d84027dd4c6032d845f7772ff3

    SHA1

    be9a2e9aada945e3e79329c84f3197ab4546adc9

    SHA256

    58bf5d0bf91711baf831d0e0011219bd554cebc571b03f8d8d393f2e93771e62

    SHA512

    36c0c8014c3f495fb5e29ee717f333731e16e213c29e6aa1ca1f941991c07ccf09ab75ac5679d2bb7cd753c16137ff7f4e9989d204a164342485493286d6ff86

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    436cb6cbb516d829b71c6a5fdce73a9a

    SHA1

    353d2321caf12f2279193822b2456415513a0768

    SHA256

    acdd97c47a34f874c05ad26dc8aa2dee0d493d4f75b8d5cfda93787fc334e992

    SHA512

    b2c6a63854e1894ac729a79b1a19669616886a258370719bb4ec8f7a95708734f808228ee1d60d6ecd483292a6b458dd9f4a30a4be4cb723aa2549bb34a49629

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    a76e8bb061a8a9e6049547e3865caf6e

    SHA1

    96114de91e5a9c4976eb71c23cc3a463d68c9a15

    SHA256

    9fa7ece1cb3fd095d7459e146d540934588203fc26c27e9ef81074fe1056b0ce

    SHA512

    88579ac9da46e4829913abf58ac18c8d1fdb89e480df20664db9f226bdd939069fdacb4803e66c0ffffc3503ce5724a3004f6e95d6c599b1283ce7bcfd1e073b

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    65b35b92eeaeb87815ef686f024933fe

    SHA1

    c0cfe5c0c91df4c37dc90e1e6bc6728573848817

    SHA256

    e0ef9be61f0e773bb9ade06fb8a748690da88ae0dd2e98d7b26708f859b8b8cc

    SHA512

    861fd9e2a439b2318ec068a9d25b12b3972020bffd5471c37c8a1b783488f4c43b3150718bd8f1b47cd06d0092350e960bcc019cab566faa994cfea175f82fd0

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    91KB

    MD5

    8a17e21da28f132a2596243dc1df63e4

    SHA1

    df9eea810593b2c8ee2a1a1094803dbe3e9a2fc2

    SHA256

    a13d92fe1581f882a0fd39e1b0e87ab696f79dfa098a27cadb25f401f0e9a742

    SHA512

    cb303fade7f97d6834fffbd596565dabfb0017993b8e82e77285e7ae41763ab5e7ef18042de1aa5af868f6e6f56fb19aef721422807b4adbb7ae083e72f240f9

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    91KB

    MD5

    2a05e2e7b18ca3a1c9e203e057df4e22

    SHA1

    d329175350b906a8f71888080baff44eea409dde

    SHA256

    037d7f98fe1cc31fc1d81b846c6fd308d9707f1973fccc386397ae472249f801

    SHA512

    6d56a6599e6188bdac2659dc12395c49616c20c37718c8126943c3fddebeb8f1d0b601d402d87d475cc4afcb81e27c0fd5b5cd5f86552d6b4f188a264011cea3

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    91KB

    MD5

    e6c690deb71397c35d8bf082a0607a25

    SHA1

    a325f8374c320f32aaeb385d80a9b6ee7a292dbe

    SHA256

    dfc844f5b84a15c2ade0ea0a1b830113853b0b281b94275ee60d43331ff1a029

    SHA512

    9b3d12a3e28d53fb9e735e59467b5b791ceb71abaa5e31d373590a4b23ac429722524b90ad464c8501a353fb4fd404f225fc6673e7a79eafa63d106f9e76d8fe

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    f2f9cdb9ba414a0762bc20fc6c270699

    SHA1

    8174c7ae9ffad69314de5860fda38e56ec91e9a5

    SHA256

    cf5093495145716b077028b43f81fc2fea1887a3c8ab0b68cd386577451cfa49

    SHA512

    32e297c07f52fd7a5061fed503624ea99abc100eaca77931eedb3835b72e45479e64d0f80561afed49e941623cdd5ae053b97d4adcbe658833edd137ee1705fe

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    91KB

    MD5

    aaf70bbc02da1830564abbd2a58f8c3f

    SHA1

    b2b64c0d6effdf559e90f6380728bc8d70d25daa

    SHA256

    f27ab0206a9d30b7f3595e1a252768e646aec31e69dcc0b2dc7acae449bce4ec

    SHA512

    2ea2f5b8c53ce749d4d707db5e222c9d2d87a6d5859e4dbe3a5ece713994911761e2e95d26e017f09cd58b0d3e986260013953628adf4cbfbecfa6cfc187418c

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    91KB

    MD5

    6fb54928dc97b7609c5d9abcd41fc023

    SHA1

    a89a3be8b12dbdac511086d83987575f880ac8b4

    SHA256

    57edf63ca98345b77882fa0f0bb2b8f776c896982b4f0e35c88cee4cd2c79005

    SHA512

    7e4e63f8680cd32d04c5e5c3b7d4d11a93275df0bc7467d01acaa449e5d765d9134a39b31d971d0facd2bbe36011c4bbfb9cbbaf34e432d6a2e9931565cc7a97

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    91KB

    MD5

    685403cb101fb109846fc08743c34d9e

    SHA1

    308996254958dbb83bc768873dec55f7323fb35d

    SHA256

    7c7ba94281aff39ec4a493575e394d76f3f198d6ecba8cc4457d41d0da8e340d

    SHA512

    54235ae168dfd55721032f049eb876d004e1f4ea7704a99be46cd0754f6bac8da0b9adbe6598d873c4501bd6599a2812ec82688468dd6ce0c647e5b2bc44f8b6

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    91KB

    MD5

    d755c321acfd2f4d51be7bf76ea96bf8

    SHA1

    cfe7d773925102f93f82faffcf2c3a27665184dd

    SHA256

    d10f06c4ea4bd71278afcaa51a67270a99211e54b2f15ba6823efa02e25c1e92

    SHA512

    d858e914a823336250fc7c36ea7f5253a0d765676c245288a04c7d17dc56302dd6c9c26563b09c543de95542f4379044d1561419d5835d9b733c8034790e7177

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    91KB

    MD5

    8d099ecb73a34a4ed02d1a75964d0ae1

    SHA1

    7cf2309ef5caa39dce9c90e5880c029094d7ec1d

    SHA256

    f95a89cc75f5591cf54cfa19c85d73c7d6ee6477451f1dcd9abc4b44a34c0000

    SHA512

    2a684a01964b4fdc42119dddbee88806711ea654f0182e8203439ba5fe4c5824b0e4f1ad30c33559f539cf3fb6a900de23cc7b4962529309beececdd754a727c

  • C:\Windows\tiwi.exe

    Filesize

    91KB

    MD5

    14c5c2c7c69bcca4c134f47b1f2171a8

    SHA1

    355d667ac07877f1b2f0fc7e90b09f4244049b37

    SHA256

    3af791a180bf52b9d9113153340b8cca5cc575af5ac6ba955814300549d41538

    SHA512

    69e92021ba592f1b9dca0340843ddda10b0e5e2adc44e440a840eecf5cdae485c96ac0a27054b0821c4b3aae04411383186aeb1817e2d605578dc4d08295320d

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    91KB

    MD5

    c8cfb902325ca79ae92ab90348a0b47c

    SHA1

    c9dd5571c7ba5c1874f29a07076ebe5d353335b4

    SHA256

    fb230c130284f0daf1d14bc70cbf032d3d169c160ef312ec7f30774fcdd1328b

    SHA512

    8c713a0c39edebee5be5c7bdf9ae404d3489d548714cc8c03fb9ce3e652037544f966b1ff09c6e84b70f14bc6551e35fe274d2cf2165c9b5f214e89af4aadfe3

  • C:\tiwi.exe

    Filesize

    91KB

    MD5

    1171d8f660a97bf7321f300bb274f6f2

    SHA1

    d0b3acb30952888616e88109f779e806593e1fe8

    SHA256

    829aec478765d3868e4bfa4dd19e128bd7fbb7dd94cf3b5da6abf9b70f900617

    SHA512

    d5d7eecb750f0c1d1bf1573ed3c3608a724422fff2355e020c4e5cd9a94b1db4f2a88bcd4407179ca2cc247c080ac855b45cd52b2515bfdf15cff0bfce1c9188

  • C:\tiwi.exe

    Filesize

    91KB

    MD5

    db8c8c1dcc79163f6a76ac8660d2c0c5

    SHA1

    d14f4044165ddffbbd8051bb8b63294f9d18a9b2

    SHA256

    d049061237369fab2e6a6e88ee0cfd85de786e7f9dd8247acdcfac2c58257a09

    SHA512

    0366b9512a048bdea27f073fc6f6329995daa38829326d528d0ff582d90ce6786210294a401e504975c36d9a5cb7b63a39d02d5233ecdfb0f874d6bff94d157e

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/556-319-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/556-276-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/948-297-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/948-274-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1352-323-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1352-301-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1456-306-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1484-326-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1484-294-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1536-321-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1536-356-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1600-295-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1600-109-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1600-384-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1712-328-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1712-313-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1968-180-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2152-281-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2152-261-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2240-298-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2240-115-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2240-385-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2308-283-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2468-386-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2468-302-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2468-121-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2600-366-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2828-290-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3112-316-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3300-362-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3300-373-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3344-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3344-126-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3412-95-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3412-272-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3412-382-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3724-312-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3724-329-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3828-259-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3872-260-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3872-273-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3988-383-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3988-275-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3988-101-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4068-256-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4068-182-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4100-364-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4112-380-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4272-361-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4272-320-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4600-381-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4768-377-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB