Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 16:55

General

  • Target

    8e543ea0c43b5b6aa251af4c69e6d4a2b96dd0a2e3f0da82787fd2f212c00de3N.exe

  • Size

    64KB

  • MD5

    1d55d85bc1f14e63a117d74f2d3a5380

  • SHA1

    53ac4293c83ccc6d8e3e53eebf9fdea1c4f12bdf

  • SHA256

    8e543ea0c43b5b6aa251af4c69e6d4a2b96dd0a2e3f0da82787fd2f212c00de3

  • SHA512

    3b914cd30f9412fc4bdda6b258b268c8640aac15f0d9899ce82608bb122af9eb0c47ca1223acfca0d4cc7da4bee8e94670e14d7e8aacf631d3b3fb7f91edcd1a

  • SSDEEP

    768:VNuG777/+V36n9PcXYvn8KR1I3NznRAQZlh4VkpX179r+R5NOwekflNuG777/+VS:V8w2VS9Eovn8KRgWmhZpX1QAwJ8w2VS

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e543ea0c43b5b6aa251af4c69e6d4a2b96dd0a2e3f0da82787fd2f212c00de3N.exe
    "C:\Users\Admin\AppData\Local\Temp\8e543ea0c43b5b6aa251af4c69e6d4a2b96dd0a2e3f0da82787fd2f212c00de3N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2724
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2080
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3636
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3212
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1504
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1712
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4284
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1088
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4276
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4756
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3488
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4212
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4948
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3620
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1604
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2752
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1144
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2616
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3648
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1292
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2088
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:676
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4936
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1620
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4840
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2388
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3620
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4608
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3148
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2452
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:972
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1772
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1224
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1688
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1848
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    64KB

    MD5

    634fcef805f0be2fe05153a364887bac

    SHA1

    abe2a711a198841e2e28da185bbbcedb58e90ae2

    SHA256

    4a1c8d7b20ae1bd94931b0b914dd0670618c54d4079cba174b50f514a9417ee5

    SHA512

    5f5439a244d3fedb60ffce94137c93b156bed7ffbc58b9c648999fe20774b18d5142cf00e772a19eac636f15f6db182bc7884a8c3fe254c760395e1d4de1827a

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    195b06c0934f22211d035a16de79fbe2

    SHA1

    67089255dec8627b2378aac9e05838f0295b0cbf

    SHA256

    633287dcf8330376b2c1268cc236fa8b0b1a1098ec040a242a0d6dac05f96874

    SHA512

    b85c072d75f7222cdd4e59cb886c7af185f6d262fdee6dd1c27519490bc9b0b6e88985be3959831a77c244ab022ae295ef7af2863e5915154499551bf510c96b

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    64KB

    MD5

    2e99b2d9400ebea76200217b8938fc94

    SHA1

    aec89cbd5202ec4ac8bfc8db448f0fbdbc6b2dff

    SHA256

    8ff2ff47654a961e95c9f4cd0a7bd817de79d30929f9b4185f719ed850b62d6c

    SHA512

    ee03b8c4ec5538e6bff1ea333484e08a2fd929d808794116a30a2be4cb27e5777c7a4547b9a47aa4558e48cae8acd7ec8f15584a5257bc1e53975e807d281842

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    64KB

    MD5

    9cbb9c9dd1f57282a1cdca1a9610c3db

    SHA1

    43bc761c721581516f83ee3daf1af63a63c53b70

    SHA256

    8d1a78430d3ca650786d87bb83ef541af7d54726c23a9994441993e78b070408

    SHA512

    97b74c268c4e98dba3573a024235f9b76e391043334e276ab697dba5a84e4683f086b6ab99d2af2bfd3690950fc1d21b525e9074faa3a65349c6d94a44aa6782

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    64KB

    MD5

    61fdf8a9637b19ac877120e3d9d817b6

    SHA1

    4387c564aafda05e1cfaed9b9c968cb5ef49def2

    SHA256

    f094a9d29b0f5bc5d61e680bbcee1384bd8da8600236292a0b25be38888a99cd

    SHA512

    1c1dab432f2839a1585949649750af1f044a8ef5245ea71d7ba7bc46cc74677d30c1f5cee226b3fc3635261deba4a0225b57cf94a8088d111d1eca5ecd23db58

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    64KB

    MD5

    a571b2427f53e9b6a5f64722292f0758

    SHA1

    f32fb0389c7133edd7da849ec87a2223e4b1345c

    SHA256

    679fd821ef3efd422e8d422c4e16f41486a2ab630f1205acaa92ea029162bf0f

    SHA512

    f4871ac41eb7e24053dd1130e043885d68862b9883dfd0c58705e96fdb224aaf80b997f843c172f9b02f6aa2e668d6ef48d4364c7680b96fbb07620509451bda

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    64KB

    MD5

    4af1dc6d0fcae06d4901836170873cac

    SHA1

    4597e7c76ad6252953dd4d525c4843b85adfcd73

    SHA256

    3759013e09d56b106d74bac49541fa206d17342806d33d0727c90b2dbc8a0717

    SHA512

    ea7a118869f64698e6e344fc2555566f94634dcaac6523d16dd9196b9294423a7cdf409c34e39460e477c3cf1cefef975c66c89d87e84fd4fd58fff970b1ad6a

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    12dd98c7786d4dd149517ad0b70c0872

    SHA1

    c8b0b0c9edbc43d5f00b630268c42f6cafc43a56

    SHA256

    300f6381e48f1116b2138ee04cc9e10a981e7408346f928ab5818a34fa8de691

    SHA512

    d7c16a3055b1fa4bbd41a3d7de476fc6c09f87e40ba5e91ab8c11455730cfe366b55832c79b8ea08a32efaa782ff9306435fae217640860c6e2dd7f5d664544e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    894feb195b2c4deedbc1b41657c9ed1d

    SHA1

    16a5530ef44be4237c59958e7c3fdd8c1ef30ca9

    SHA256

    e6f2078e3bf47eb2309da81336a47ccfc08a09904ede030e0fa52d1b0f638ff5

    SHA512

    b8b2cb563d80ec61d3b9597768296483384cf6c6ac620f92e0ac6fbf40dc0b7d14c0be63d927ffcf77c82a9fe5a6ce50163407956e1f6488e692ff618cab4fdc

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    64KB

    MD5

    c8e37c4ac7715f953c73cfe81cdee5da

    SHA1

    09e3f7c370b272d7751f91540d65885b1dadb314

    SHA256

    d98da41eb08ae14b8232b5b50c59c081cc0fdfe055f28b6dadba7f4aceae2cdd

    SHA512

    25c19c868cac1db06ecdb3958dbe29316174decd27e47eccba7387b71e5c584d8bf4c170c91a53228a4f95f22ed4c304f95320e29e25fcfc441f6df276803afc

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    64KB

    MD5

    3b5c7b4814b22466eac304369204a525

    SHA1

    011832296766411129278b1235f9233820d18c73

    SHA256

    85c38d148ea4ee4c6e3ab5989495f08550c64c915fbcf8ce05ea3ff1061cab7a

    SHA512

    3a093e7b6715eaf039639f15d75d75794795a6643616c25df9ef1f401210616b14b4efebb2551d32d340e993f4b320416e8c3c858df60f4c420f026fdddf5cdb

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    64KB

    MD5

    aed5c0b545fb29004f8f2e556b2e3200

    SHA1

    fd3ce87a18964543e033cda508537db22f7dc727

    SHA256

    972a60818fabbc2534eabf23ae82ea3dcf0c6a34bc9d8d838047d81a3ca4aef5

    SHA512

    282a38f86416ac4ad60f0cf4df901ce9a61d7bfa687daaa33fd32148f5384352e69e6875e59c599790ee20e17a623daa40ff63d861c5eed09b168b6f55eb25fb

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    e87f723e33a9955ebf7550d50418d0c7

    SHA1

    800d227c85ab895203ed4d6ce1f209c0960a32ae

    SHA256

    d6507e8a0f7f5af210d6fcf08c23617b7012d45b7ca9e774ad75db35955b7f9c

    SHA512

    676cd6c37498311104bd794270421ae3f7fd5b40541cf51174d47e9415b89d0fbf4f51f7ee5d40e0f666d974bc12155ad51810e94d3d0ccf3d7a6c72729c9bc4

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    044258b9b5139c1b4de4d7628f2e7275

    SHA1

    20a182a564ca990b94840632ccb6ec8a5f57c6ae

    SHA256

    00f1f87d6e0f691842d70c7456fae303a955a001fa0db75fa1a70af17f79d377

    SHA512

    bc9fee87e1ab0d6a6a5a31d754e93026ad67720265fc23f2838b6fc2f982b419043e2a5a14654baf000a7807860f8241b0377189b4499a08287fcc737aace3e7

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    1d55d85bc1f14e63a117d74f2d3a5380

    SHA1

    53ac4293c83ccc6d8e3e53eebf9fdea1c4f12bdf

    SHA256

    8e543ea0c43b5b6aa251af4c69e6d4a2b96dd0a2e3f0da82787fd2f212c00de3

    SHA512

    3b914cd30f9412fc4bdda6b258b268c8640aac15f0d9899ce82608bb122af9eb0c47ca1223acfca0d4cc7da4bee8e94670e14d7e8aacf631d3b3fb7f91edcd1a

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    64KB

    MD5

    d529672c3c3542784ffcc94bb3ce92a8

    SHA1

    f8efa69358994532ea32b19033b89bc496d03191

    SHA256

    982146449d58e7a2f4574207411fe9e42c85b8bd5563a1022319d52463f3a901

    SHA512

    4b18a04bb3de5e877dcab7a88b4f0c0a9558e818c2f01c7df322a57fc0b47f52632945e81288d45e9ef8043d5d0a4af1a2f0bb5a22d7934800f2a3c850d7ba19

  • C:\Windows\tiwi.exe

    Filesize

    64KB

    MD5

    865d1293f4356017b4581545321630a5

    SHA1

    bfd55f117c7b6963c0accbc9f246a6f9c1bd251f

    SHA256

    8f0d2a76d99e8efda6e52931f06e062dca22aeb35358d06e0f9ea781340f3922

    SHA512

    cc13179886b3388e295cd29a97d49043c5d0bfa72d351c6f03d136b172759281cabb11d10e8f408c18cef800fb4bc598ff54d76284fb68ebb0356810dbc9faf9

  • C:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    64KB

    MD5

    41f66dbbb3d7082c6940020d0c0e6b3f

    SHA1

    56312a61191791a9999dc8537f95321488043270

    SHA256

    958fd51c161e27c698776ecdf54cc415a5cb30730e3763d0cf64250c67695db8

    SHA512

    954f5d2b521c8e9bea6cc19e7506a1c00f923ef106ba076972aa326589f4e48b1c9421e5009d5d213bb6b823f24e37c289d9f0d37ff286175546921a45cc7c27

  • C:\tiwi.exe

    Filesize

    64KB

    MD5

    67b939064f4c3ab5ac123badd22d9b9b

    SHA1

    f436591304d8107125e650f8c6e1103bac58a468

    SHA256

    cdc64bfe628a1813d0e596b19c15ffb88243ff8845731428f83a985a22ccc4b6

    SHA512

    0d27c73c2f3782e794daa02139e3d1a1829ebd37e5953e09abb44418970e5873e623d23b96d2d781bd097ee15bbee5d5a97fff5a923391c90acca45994cc604a

  • memory/676-403-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/676-225-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1088-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1088-286-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1504-233-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1504-261-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1604-168-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1604-204-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1712-264-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1712-271-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2080-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2080-282-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2724-232-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2724-416-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2724-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2752-382-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2752-207-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3212-210-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3212-229-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3488-305-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3488-301-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3620-167-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3636-206-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3636-197-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4276-294-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4276-283-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4284-302-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4284-284-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4608-285-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4608-419-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4756-299-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4756-293-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB