Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-11-2024 03:40

General

  • Target

    bdabc17526e2f24819a2f40417405c676c9ea47ce6041a7889bdf544558df39f.exe

  • Size

    488KB

  • MD5

    37807dccd6ecdc9700ce3c2ac688da9c

  • SHA1

    c63f7e6de6f1f7ae271bff34f96f014f8812d0c1

  • SHA256

    bdabc17526e2f24819a2f40417405c676c9ea47ce6041a7889bdf544558df39f

  • SHA512

    cadff41947cee0e1ff1485b802499f48a94a160eb78f26a699ea5a9bdcd7b5f5e5d9d2176b9faa421fa228304447d414458a4af578fee905c890a4779cb00e7f

  • SSDEEP

    12288:V/M//MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:V0K2O2HIBEd7M

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 4 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdabc17526e2f24819a2f40417405c676c9ea47ce6041a7889bdf544558df39f.exe
    "C:\Users\Admin\AppData\Local\Temp\bdabc17526e2f24819a2f40417405c676c9ea47ce6041a7889bdf544558df39f.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4068
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1332
      • C:\Windows\Notepad.exe
        Notepad.exe C:\Present.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:4764
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5024
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3572
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4252
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4724
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4216
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3696
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1400
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2864
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2252
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4188
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2372
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1476
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2404
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3472
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4148
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:380
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3648
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:680
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2284
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4160
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3596
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2812
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2396
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:400
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3900
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3852
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4512
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2460
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5024
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4504
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4924
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3520
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3112
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\Users\Admin\AppData\Local\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    86bf7516c89bf711b4a73793d22f1fbf

    SHA1

    73a9502807c0123f409c36b7cfff19f95a8534c7

    SHA256

    d05c300859ffb23f56664c6f72784b318999ad01a8a75506e95a8643b514950b

    SHA512

    44034b9ec4b4a6c0e095764e370a08e657f09e85404bdf87d577f7b2aa918f3db45a7e06b22f76d0e3b0d948e2e24634a838ff438412d146e3c639eacfe26ea8

  • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    a2086897216f603d6b9cbce5b9e1bf33

    SHA1

    7bf9cfd90444d86c29fdfcb7d253a5c41708f0fa

    SHA256

    c2cc22ff956c82e9a33d6c4d27ff1c474e56537437999b3296992f2b4dd0283b

    SHA512

    b9dff20fb2cf416e4aad9a037715080941929698c593347e5b64ad6a23d1eec825ae63396cfa89758e8829da32245785ad7e0240f9613c3350858657c601b84c

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    b5ab66d770d72ffd2df6910893380b21

    SHA1

    33c78afc9e84fee2ad4a8aa43428cc2cb14c0730

    SHA256

    57832c044339083a126bf5bc6ee161950a22513538742de8f2f3bc9db23f3591

    SHA512

    dcd598c599dfeaa057187c45a07715632fd2e985f0e4fc07bd475da534d63eee2251b94ec01ca4a3f53885e2af259dbb65a70d867c6936fc66b6753c3bc8041c

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    0ff77421f247e095ade05b0b65ebc64a

    SHA1

    8e1fd81e4341a212ea87e5e5ae5e0e6070705be4

    SHA256

    428205a6e371d4a9bbd69f423c569dce85fe6bde1f041724cb783812a1873015

    SHA512

    dd275463c820533235663cdffc0596ada1a618d255a36c6f6c0925eb67a838648b9023049dd80493d445d265ecb6a34d3ca2c67f2af36a81592f9b999a3a1f8e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    5b232f897ebc4f976f19c19ea1b1d51d

    SHA1

    5c05de18912c08f3a9fe097494b5e47131c0d2af

    SHA256

    4fa2ae6c73d1a7595cbce1f36de533911916d6f3eae8788c4ed60ceb389e021b

    SHA512

    42a212321ab4f6ced2a51416841bfbdbb4170b252499c9a086649645967876a6ae4763f2b8054b46d0d36f01757db5d6d02cd689d36dd2c18239cb586de726f6

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    9c364db675059d6a64fff510b1e25dff

    SHA1

    680209bb156ae6e8604f34631059105a8625fef3

    SHA256

    b85ade5d252f7e0730f38f2476db204ebdd731c081d9a93406b53ebc85853679

    SHA512

    27b443eacf5fc8476336a495f1a21044c77352d3d81d39e9052631d3ba4577a48f00b8ce1a9ab15aeafc8124a23824a4ff6e982b397642ec4456b248c20ab375

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    9700b4278e1d3f5b4a000fc7fb8dd5fc

    SHA1

    1a17606210c706413cb28972f8919bfd7798e6b7

    SHA256

    87983d44bb3ad93a2f458ac6ecf5034d9d6972326cd92279dac6146e4f8e0d56

    SHA512

    4a1a293756466cab65b56d13d9e793eecace652308a0e5b6f83634bdb4d2123d2b598e1f57439e0fd72f09b60fcf12f74cb0cec7c0bce34f542a86394b811e15

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    726a8f65fafe880c6ba656978a3ec5ba

    SHA1

    20cc7a5580113071601ea7409f173437091e5372

    SHA256

    6d58eb8560353ba96ec529a0d625fd8aca9fc9b56e7377ce5c75f2aa5affda7d

    SHA512

    8ff1b3c8403dc6988447653b0eab4b77b0958fc7621433a8f06072411922889e1b4620f9021da42e06faf65b26bdbc3feae44d69b72f7ae184d044adf51a8c30

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    fdde6395ca22d95f884fc9b1ffcc0767

    SHA1

    8ce28614319c4522137d0a10ff4e93b4d41dd6cd

    SHA256

    eb24eaf81e59177df5e47dc7334362e85b969c2d07cf8ad4f44dca85a46712ee

    SHA512

    84f8b5e00b040d16fe030d82ae67d62278262720a9d66e3ce32042b6fed0c8591d54efa5dd8ba9c1ff664abb833e52fef58b7fcbd569af2232731ad2d91256ee

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    8f87965484c460a5bdba20ff5e4823c8

    SHA1

    34631e235c01523843179619e5c242c292d92f93

    SHA256

    f9daf7ccd179a39ce5551be62252ff527fa7ef20324441db9b67d379f1e5d22c

    SHA512

    e71982912d2389d0791dbfbf15231929140bc117a134ff221de9ef0946a795eff348922906fbed2215876bacd67cb46973894390fbc30c1a5bb29d82fbfb5528

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    121ed2360bd8e9a43bd49ea729c0df27

    SHA1

    09e29ad758a9e3f5ab57b933dca64695be946e22

    SHA256

    f3f092c1ce08288afba80f648f6b083ae41cb3702335ba20869c6311572efdec

    SHA512

    ebd19a9600bc767deb5fa954f5371cf33497a19e7254c4729f743addb592169459b755a90e661e8f5ce19fb7d8a316aacad39b9ab830fcd73daea341cdd81878

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    2c6908045092a42a1fd8313c2f5bb9b0

    SHA1

    168ce3c4f286dc419f4d9493fef5224c541e8458

    SHA256

    c6a13bdc37963feef9e4ac3761662158c6f4b51c8e55f7914ce9c0ddd887372b

    SHA512

    fe3a96d76c8411221997b4da282816edd98fbfb8f398ccef136660dec2ad25ed9170f019f8923c69be474fbd991f52e22c7011dfe59b3df19660b0633d281685

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    3ac54a936aea06f5cbd497b3dc80f085

    SHA1

    5b5b275e65f7bef50b6ef8b80be38993a0ad7dbc

    SHA256

    78b977a29fd9c7a4bc91b4ae1aa8a727510368c3a15d6291902eabe2a98269c4

    SHA512

    b2566850b07d2ab19797303993c22319784676f4d42469df78b0e8d807a3e29b59c3d55932aa8ea52499afb6d529067fd7478df3fe3c8274ffeeab0419b67c49

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    0f4d75d4309d41e0bccb30f4422abeb9

    SHA1

    b5e779376305788c66f12c9d426d0ac8a649c47f

    SHA256

    4e69a2ab431ce73c08c51d4e30d1a02d965d944be56ed7e817705b0e2d7388d4

    SHA512

    4a06312aa8fc4b2b64713495b11f77e81fd459f0909eb0ed8756c941eef6d4c3c4a4dc1d4536c4deddfc49506dbbf1d09ce495bfa2ef43f17f16c5d2e18c2454

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    f71289374af65597925b8e85cb3890bf

    SHA1

    242ac6ff07d54720a0206039361959be9bff72da

    SHA256

    7480b52e3f5b6193f16b8a807c68062537c5fe467260fdd4136b1614c7aa006b

    SHA512

    ed9dab703620c7bffb0978701ac472e3f8b82d6f53e75dd3a1da8df8781238db7716594b79b5d39deee9896a4869e645f9d21fd8b9c28a625be2ba88915429e3

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    4f53660434df284ea2dcc84f83f99224

    SHA1

    d84f388268976d9f65718e259cdef983940ad5ee

    SHA256

    cbaf76f636de4d2184f62d1d92ea94af75b98b49e6601e94c87392d599981f32

    SHA512

    abe3bfc777b8b48a28c2e3a18128df88400cf2e886a95d69ca960b2ce084771e605487daa50b7154052efd3f2d756fd67362b658d3e7c0fae56932ee4341fbd2

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    37807dccd6ecdc9700ce3c2ac688da9c

    SHA1

    c63f7e6de6f1f7ae271bff34f96f014f8812d0c1

    SHA256

    bdabc17526e2f24819a2f40417405c676c9ea47ce6041a7889bdf544558df39f

    SHA512

    cadff41947cee0e1ff1485b802499f48a94a160eb78f26a699ea5a9bdcd7b5f5e5d9d2176b9faa421fa228304447d414458a4af578fee905c890a4779cb00e7f

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    1a8973262f973c2ead987e271088ea52

    SHA1

    7ae9903c6076ee04f0660e65cc878c873b0ee12a

    SHA256

    8c5d61871444293ffbd486301d9bd3aa4b213f9e35a9cf0fe572ad72e69f4f29

    SHA512

    c2294e0fc96ba9b8eccf1c4da5fb1854c942d512dc9f90a7ed3b9a1785f28f9ccb928b137448a383fa5f67c3d48fca0c69038c7804ee54519d9a0ae38f11353d

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    4ed4e4a8966c80b955f4eac94de3e3ac

    SHA1

    8968b47fe10bf19a72940abd946980b28c462491

    SHA256

    8a7ceda96479c186921cd735585fe32f49a125636b6774622f20041d94188562

    SHA512

    336ec43fcb17f582877e957d6a542d4168363cfe253cff9f41759fcaa9dd9a2b2ffdeb6beca97365a7855a5dd180b3bff7de621cca80224fd4d7186c41a37967

  • C:\Windows\Tiwi.exe

    Filesize

    488KB

    MD5

    0d8a333c3dda356c844e78271ddff01d

    SHA1

    64e91d087f9b60eadcbd9df000e4dc9188a4d519

    SHA256

    7eccfd4dd247faae0704e7fd379fe1d563651638e38d0fc36543cc2e08c5d62e

    SHA512

    6ac0179ebd3811837e84af37f04f3de4ea3ef8f85cba3b84d3b8c2155a48b4503cc134010b27c62ddf1a53d64d103b3e5c7a001d8819561a2f6368152a32e62c

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    8aaa7739e2a701ff825fcb5601eed1f8

    SHA1

    9b68fdd288283ef91fb087076b0eda9ae279aa57

    SHA256

    0661ae152a786940aa7595eb12d8986618e4f3412e12446f371de6772b309fd2

    SHA512

    d044c55f226cf4c2a5e97c0c6f95aadafac1c0a5b8d498af6855d509c3207dca2b6d1f50b28c6815911ec17844795802faaa5c3c7f5fec41683daa7a54c53d26

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/1332-271-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1332-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1400-251-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1400-280-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1476-148-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1476-155-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2252-292-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2252-360-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2404-154-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2404-202-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2864-290-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2864-281-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3472-206-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3472-358-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3572-229-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3572-256-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3696-279-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3696-103-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3852-419-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3852-274-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4068-258-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4068-412-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4068-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4160-221-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4160-373-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4216-365-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4216-359-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4252-259-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4252-282-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4724-287-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4724-357-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5024-228-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5024-199-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB