Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 05:10

General

  • Target

    e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe

  • Size

    64KB

  • MD5

    4e0cf4ae6d67a0f7544148bc3a10deaa

  • SHA1

    97a5175e1b4e11dd7248132be773eb1fb4de6477

  • SHA256

    e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3

  • SHA512

    718679ac586f512de52079edb16d3a7619a3a8e31e2c0d8d8bee3fca743fa77b62a319d1b4237019ec850b47508e3d93a7135c15333205b27df16d38ae12df4d

  • SSDEEP

    768:VNuG777/+V36n9PcXYvn8KR1I3NznRAQZlh4VkpX179r+R5TOwekflNuG777/+VG:V8w2VS9Eovn8KRgWmhZpX1Q6wJ8w2VG

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe
    "C:\Users\Admin\AppData\Local\Temp\e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1092
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4516
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4560
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4624
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2204
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4452
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:3188
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3456
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4100
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3900
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1672
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4340
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2008
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:764
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5092
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:208
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3388
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3104
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3156
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2124
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5088
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3300
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1952
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4648
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3068
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4920
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3888
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4800
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5020
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1976
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2460
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4240
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2480
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1152
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3528
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    46c4a31dce99286e768eccfc5440da2a

    SHA1

    bdaa7b327ac34dd8898f04d3b26e460b824d3d6d

    SHA256

    b95856dc182a931a371891f655a7f150c342f2af39d77a1a3cde4452e5158ccb

    SHA512

    8b50340c7707fff39be9ef135f1f06f5c35d492ceff4994334221ebc89fe638cfc3300a4bcc702761b788f44f5f6d512e535b1b7a92c8d87511baf70d3c985e4

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    64KB

    MD5

    d52e85ed72ac0a20ca82b9c8a161fe06

    SHA1

    4e0fb1b82017dd91fe98b643dc4fbe563b223565

    SHA256

    0b4ee1b8b70ffc44e83d6f91a2a04b868578aed49e24e9a49bb33baf83ff2d3d

    SHA512

    5f57cb042fa4fbc0169687d0d2db329cebbcf620148d7bc9df90db450b9a834c2217b73cd4d634b72cff14ff547534d48a5031e376d141cc53245c3db62fe4c2

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    64KB

    MD5

    71119ac9b9ef2ad90ca1f74bd4ed2b70

    SHA1

    e2e695bce634d35cadec290a2b466e2eb1c8e796

    SHA256

    18f173a2702a18e13a06cee0d867da6e1407917455e1fa4357a2a87a7a2843f7

    SHA512

    789e88fd6fafadfab02fca6b68834c77f3e3e3e9b9337fabc9c4748ea6023010d97cfa53c6acdd62028290c948791affb70577c9befd4fa5a95593d7e3268342

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    64KB

    MD5

    ef9aef73429f679d9815d830e85a8801

    SHA1

    ee273d8653be39ece179a995bb547cecd584a772

    SHA256

    419775460f22d99027d2c1412f3abb0acc193ca64ef3d72ca04685e1f6b14f0e

    SHA512

    c9ddfd476d67c539d597dd746be53f813f61fe35d26e8408f1900d6dabf23f0329d95c3cd19a2e5630885292daa2bc64fd767d5651b0e80fe373ef49a03de8c0

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    64KB

    MD5

    b6325e7d72efa6356cb953a4b5622421

    SHA1

    e01ae39ebef38db221c4b0d0a657268a05f53745

    SHA256

    9a0b0470229a2e8ee822f21bcfab1e73bba1a7ef84500506f0034b9a551138d9

    SHA512

    adde072beff4b9dc73bba81ed460bea8ba278ba6dc8ad641d62f5c968f04101807b38195e9b641eed3b1bfddc81e4dc2f1e62525c60aafd56595eda085dad9e5

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    64KB

    MD5

    26da4b2ab596e15a0ec51dfee42ebc4f

    SHA1

    dca1506610e61e39883a2bd45d48dea3ef2d64c3

    SHA256

    565047a97a500d5c3fe96a594bf54d522982d7c01e8f7f9925537bfbd9f97cb5

    SHA512

    100bfb471bea32fc323e3cc069d113a6b565939b912bca113169079620eb3dc78045623b4d80b75bd1c2da3d17e7b4e0d2386a0c8abe518d4af9eebad63a4a1e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    64KB

    MD5

    4c22689fdb1aedeec86ea5a38db4111d

    SHA1

    dfb6cca484c44ac635754f9b2eb7dec2fd32b8a5

    SHA256

    9e55074ac345e34bb435301c18e4c06d384839dc99716f1517ff01641c2038f7

    SHA512

    3bcb2e57ef96db5d1e3fb5252088448024c68e77227647c82d58331295325535365b90e6e69c000f9d080673bd845806ffb7f9a887ffbb34b4c72711461191f6

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    78e456968cf36ba50bed7c50ced44471

    SHA1

    f4917c0b56cadb9b44bac39df7e3d8e808f56c15

    SHA256

    8c13009a432959bb5d4dabc2f5ec61841af8f366ef6aebd2d142d2b2c8a1eef5

    SHA512

    6cf50c866d6b7d0327cea7d3561ee41b4e687465490b4f5130943e34841eb1614e48c9cb87ee09db98f7b9b320d41ec1671dd228aca92af4a42b9ddc5b7e655d

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    500b1d9bb044d0ae34c0da98d0da6382

    SHA1

    0a85edf93e2f4df801eb4c2c2986e05fe0b0a449

    SHA256

    4aa0e708458ba561431fa2cb8e0671aa0ca644aaaafc8e4f25570381c814f56e

    SHA512

    0a6fe2cb6ced4a692019babd14429ab5ac8f2ca1a6b3c38b8d4ba10d1c1fe64762567e345ffde048967ce0916a4f0aaaa49d42dc85544b86d0e4698d7f265a0f

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    d6bb2f8f3a7740de1c5e4734e21783be

    SHA1

    9cf830fa17d0ed79b98b0e00b0d74bcd908f5614

    SHA256

    336bf803525fc1ad5cec22150912888dc2088766ee28b0a947e8dea2ab1ae697

    SHA512

    60ca07605d0e909cd5783fde472adfaf0664e21d972505bd4c72fa3eb73e76d17cde4f8bec960d77c55d776b45cac95dbb3d7892b7fe20936d049a18d85672a9

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    64KB

    MD5

    a3b962b1f792b86e59abb436ef77af37

    SHA1

    deb5dae13ec8505807f228800b3c80ff36449bc5

    SHA256

    c7e47d14442d3292e4000b3a6bef54dd1644c5af78c5cad760304560e20bb564

    SHA512

    767b429f098bec2aafb2fa8bfaad2aa9118e756e4091161214766f3d71c7ebb5640212a724a6b6dde3094fe423db4e601ede46cfff6958da596e5b3bb1e38c3b

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    64KB

    MD5

    9d940aa5386866778546e7059130115f

    SHA1

    82b891295b59966e5c2650aeb1af8adda205afc5

    SHA256

    a1a19a3370261ba7b544afc229d3b43d67718f72e5de54ff49e7b5b8c3a68027

    SHA512

    15254770b92f94cdabbd3635825246bfa08e09a2d9a856674567cd807f47be109266ea05b9c9fe839f0a97dc12a421aa7b1269a2599089c0d75a2bc66379846e

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    64KB

    MD5

    b1780694d40ad95bb45b1482f2dce97c

    SHA1

    5d04bf9226c25348ca893b06de7ef460902afe9c

    SHA256

    705dccfc8cd0ac807deea58274930bf65bc94449cb0b03778b3893ce89d161a2

    SHA512

    58972c043b511b742210aef7dff9500c1575a8ffa0c7aaacd10a783cb6e130f470f27f002a2ed9428a7e9ebd617efa6057218ca83375b6b72963ff9db52a9a70

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    b29e6fe8b6ca5395f8f92c2badc6c6fa

    SHA1

    b0923c3ee87721b4109e5868d444c275fb490626

    SHA256

    3d5e6a049feff59f2e46d68302b8238aff14bd27d786281ac75adc38522a22e5

    SHA512

    65cd446b540639421d64d0ab98ea546d662a73647d3c1d837868632a061d6085a6030ec7ab7f3f265a1cfbe70141114c49dc47202cd4d8e599acc3b671de3389

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    c3c6fcc9b999ef9cd4943d0249c03be5

    SHA1

    0fc3f00dfe08a79ccc01f4c5a85bccb73dd5d6f2

    SHA256

    b978da1949c1408be47b03b740b70f056d2b1da65913188ed8bf4c462a325320

    SHA512

    327b3c399c26670e0c76e69b1f8edda98530b574a875e8dbd167becea4dc62a7bf09a5aef8aa61a4cbb2d882dbcb64b66413cf9e8349546a6734ed7d61b0d316

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    64KB

    MD5

    4e0cf4ae6d67a0f7544148bc3a10deaa

    SHA1

    97a5175e1b4e11dd7248132be773eb1fb4de6477

    SHA256

    e76056c0c55be08312dd90e1d010737c8e5be0f76a5a6fc065ec992ddbe94db3

    SHA512

    718679ac586f512de52079edb16d3a7619a3a8e31e2c0d8d8bee3fca743fa77b62a319d1b4237019ec850b47508e3d93a7135c15333205b27df16d38ae12df4d

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    64KB

    MD5

    880a81fe056aa6ff3755586696803d57

    SHA1

    797d337d818aa220459f7605f6f8477eb8b092a2

    SHA256

    e8d35303e1a173534a17feb4e6eb5366c5fbcf92cc6a7215bd3981804bac61f0

    SHA512

    a8019580864cbee8e5982b96507b60b33680c389e02a244d173e76c9313064963f0323ff5d22def1910939cf3eb88341a21e83528c456bedb47d09ebed4ddd17

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    64KB

    MD5

    946c9911aa3930f04b30a37f4ccf3d54

    SHA1

    cfeba6577421603df0185019ca0ac1216d72de39

    SHA256

    b35c06019ba7b819f3e51f625f7f82c107745dc51f5ac3261b6f89493f6ddd24

    SHA512

    4bf8e9a050b93d9c0c23a4a39978b55f6f52ed5ac882fd36537b881c2a662c60404cf44ab4c12f7e316163f19f22e9a7fafa78b6816b873708c76fc4da134a94

  • C:\Windows\tiwi.exe

    Filesize

    64KB

    MD5

    c8ccbeefd7750af41b33ef29975764ea

    SHA1

    76e4d32f1707ce74fc6cb0de84095c286f4882c7

    SHA256

    7470275fdfe4b376b33115ae098313e0773738e0800154a6a845350b7a8578b4

    SHA512

    a5c59834f2b4a54912724d161f8bcbd4ede546a9481d73f17b1c974142f93c29f9454f5ad91606fc55d9650dde5d5fbc185ab223ba4c5da5b18fe9c082723de6

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    64KB

    MD5

    2c59fcb73d555a2cce4e23e5169f9914

    SHA1

    7c12619063a540c321b3b623c55feabc247a6b67

    SHA256

    686f28783ceddb4cf401bb5174eaf756df20550b17dd883afdf7760b9a598e4b

    SHA512

    6eb848ac81968e5d59b23c2c8f95f787b6b804636a750bf0b0fbb9f0b4c8a6b25aa5d76a0ac8edc8ab8000b242a105b7092e9a0870904caa40a7b9d95c69add8

  • C:\tiwi.exe

    Filesize

    64KB

    MD5

    9af3b43a017f34dce012eac962bd9165

    SHA1

    27bd34546018229044938087e92243e966345264

    SHA256

    5fe768e156fbb34c210c3c11d272009d2d50358ef29001acd338423d62759b17

    SHA512

    4bac63460a95194f0892554abef2873cd3f0769123b3cd95265cf66d3da44595f2d5f61503898b8fa3f5174fe9ea0840366541cb4dec80e524f2fff318b4b957

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/764-301-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1092-398-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1092-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1092-261-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1152-323-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1152-280-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2008-267-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2008-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2124-309-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2204-222-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2204-262-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3068-148-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3068-193-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3156-277-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3156-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3188-278-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3188-412-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3888-264-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3888-219-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4452-273-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4452-263-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4516-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4516-265-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4560-191-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4560-209-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4624-218-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4624-210-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4800-268-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4800-411-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4920-216-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB