Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/12/2023, 11:16

General

  • Target

    11ed905b5c55649b0036c3c909112ace.exe

  • Size

    137KB

  • MD5

    11ed905b5c55649b0036c3c909112ace

  • SHA1

    1ae2e6c7b4ea9ea62e81bbca3b6815255d1c614c

  • SHA256

    9cd63b5b3fe79bc9703258dd450bc1a93212859b5398642f9ef89eb567688a86

  • SHA512

    8e4fb2346c0b65d3c4b512b7be414ea5031cf52d579bed2e746219ab608c1f02dcab77335dd7fe0d4cf278ea5a8ac387370a6862cfb8fd27d43fd7d84bff9a33

  • SSDEEP

    3072:IpWC4YgBPlGiyllNpWC4YgBPlGiyllNpWC4YgBPlGiyllK:2WC4YgB9GiyXWC4YgB9GiyXWC4YgB9GG

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 30 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 38 IoCs
  • Drops file in Windows directory 24 IoCs
  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11ed905b5c55649b0036c3c909112ace.exe
    "C:\Users\Admin\AppData\Local\Temp\11ed905b5c55649b0036c3c909112ace.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Modifies WinLogon
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4980
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3576
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2576
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:5076
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3092
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4324
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2400
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:432
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:5036
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:3600
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4928
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2268
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4804
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3372
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:5032
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:2168
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1884
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4768
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3564
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2728
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:1284
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2504
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3432
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4852
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:848
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4304
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Suspicious use of SetWindowsHookEx
        PID:4532
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4056
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2068
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:4696
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\cute.exe

    Filesize

    137KB

    MD5

    f40076468acfb10a01b84defd80a2aed

    SHA1

    339d4a238125fca0b09539926ac9508e4d4ec516

    SHA256

    f7961356b584814ee97d48fee94b1958f63dd2fe712de1af7b0458cbda6f085b

    SHA512

    fe1709582a7e9d9028f019511c4148c6a3e2961190c398952cb2afe7b07826f6a6ed461678ecd3f9bd5b7fbcaca3b04c6bf0bed024b4aaed713c38bb513863dd

  • C:\Users\Admin\AppData\Local\WINDOWS\imoet.exe

    Filesize

    137KB

    MD5

    aea3a61a95e7432b50dde9e544937b37

    SHA1

    8970f07a580c249622cf2272ab578f13d7449602

    SHA256

    260c8901047e6452899033ef7314959b1dfd930b113e53ddb365e2c223269fe3

    SHA512

    06f532046a62182f8eff077239eb39a9620ea82261fbd0459fb5ca4e08f48569820db262c9f5cb567524fc040d3433a62ff68136d69d425ab17b8874ba29de25

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    19110b51ae3195fab9630b2bf6764d50

    SHA1

    0718827e21f0a56e4feef5d2820731961bfdf3be

    SHA256

    8864fdba3a6e2e5c9cd32298a1e5286e5009768e9dbbe608e98243807472a592

    SHA512

    ee038d1885b98d8048b91a3c5adfd3635afb24ae3d7bf67aea71130cada00c2c351dba9a5367ad2a961298f6b984685fefa915430cac5af7eba91fdbbd5ee052

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    137KB

    MD5

    46bf6cf8693dd7b5cee209290b4e5059

    SHA1

    e77f56294e4214d73576f04925b21b1656608c3d

    SHA256

    c01beefa63b9fff993957a5728430f01246ace98cd771dfc07038c3074efaeb0

    SHA512

    eebe177c7dc241f458289106fb14842b871a18e1930c53df78677693fe883ab094901c609f64f188d1b90fc9eaeb1b372e74a144af5f26c550e35f281183946f

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    5fe7c8e3db5f15a79beb4e9e37a4c711

    SHA1

    383fbc2603c0d1b08c1f10346d12dd71e124b137

    SHA256

    17d1e3eb2bff602170eb4e8de42eb164df8ceb6840b455fd5dd4d6a3471ca3ea

    SHA512

    13f9515f65912cf2d964e82a9a71c5770516c5c84d718d220a910d7293f4419d98e2f20527be23166c35452b9fbeec7f1750bbc46fb1117cc2fc475ae4457ff3

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    7d94d3829ab2710960e9db2dc590ac85

    SHA1

    de6f8ad0c827ca576d3c9a39fbd53f1c60a4ac57

    SHA256

    bdbb68005dcba5f17b033c2b5f67d8b0c6c32e67bf6936bfe1819363be92b7b1

    SHA512

    e4be53d3dae7ed791e73c388796f7e7b2d3464e4d0566505b89c4b92453a37190ff8a3c6cec61e81ccb242b08239777f8f4454b4777f1c29cf332fd091bbc5f2

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    b085f3712acb7eff75ff286a690a9917

    SHA1

    ed72f65ebf92494d9752dfdae781c9e5020e174e

    SHA256

    6ee2a6c1121f9d0bcfaa63d391b3fae19c1e8252d16d6ed0cba9614bfa86bc66

    SHA512

    83cfb42158fc9f2f9d920447221055c363bff13b47fd798a7c2e985f77429a964667b31b8bbc6e00c2ac224f6529c176735d69a11d757cf2f4d7a50378bf9ed3

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    29406e9581fc047e4f08272c0bbef224

    SHA1

    2614a4a4016e950e89b7c1216c8296b3bf5b95c9

    SHA256

    ccb082886aca4ced66922d89277d89b4977ea8a259705251e372b65e25f2e436

    SHA512

    8328f2d7abe5ecb366b7993509332ac6db8dd2d770c331a93afa65768d1721e27b195621ca7bf3158615773a9171a226f79c0ce52e1ec82129ce88e7c4ec0662

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    137KB

    MD5

    ce1525cad33ed44b1168e855399cfa0f

    SHA1

    915ab9b10fb314d0f8e33d6f94157c63c4401e0e

    SHA256

    99a4d6eff65e7719584a6f5da2cb90a26432970d355a4ebd6a4a53d0cddd2c45

    SHA512

    2f5424a8432b9c37e01069ecadd72dcd0c379fd5458db87c44be16b07003704a794a2ef3a3e410bbb2e9ea545994752ae0d4ac929ea6a4bda387756deb23ec0a

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    137KB

    MD5

    2e0e67b9b631ee5a1adc413bc02cad0f

    SHA1

    3fe54d7b4dc04f0916598a0a827a3b2e6d8cc189

    SHA256

    4d16d911d44f6b5d60771fd1a6783629d143393971d760c041695eb9388fe734

    SHA512

    dcf96c51be38efe78f4be71c691b3b8dd107b83381a2423338dcaef48c2afcaaf842e945098c1d8c4492c254d72a342cc6a43fcb9da0f63f505dacd121755d3d

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    137KB

    MD5

    42735de0956af6ed616b13362727ceb1

    SHA1

    e6eadd62373f1bfa2c0832bc184171445884f197

    SHA256

    a0e0355c4beebb5e93fcbaac29b2a8129cf232ff9e126e1c4a740a11a2ab3fcd

    SHA512

    3e49ea8414a3a22d788a37369f495c0af9b4d27e633043190b9b8207e77eba3cd6ac0199462650acf3a77f19868e1c9e4e5858011541d3f4c57ed2c46bf3287d

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    137KB

    MD5

    11ed905b5c55649b0036c3c909112ace

    SHA1

    1ae2e6c7b4ea9ea62e81bbca3b6815255d1c614c

    SHA256

    9cd63b5b3fe79bc9703258dd450bc1a93212859b5398642f9ef89eb567688a86

    SHA512

    8e4fb2346c0b65d3c4b512b7be414ea5031cf52d579bed2e746219ab608c1f02dcab77335dd7fe0d4cf278ea5a8ac387370a6862cfb8fd27d43fd7d84bff9a33

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    137KB

    MD5

    f2fd45e25a9bdae1c1144b97b62be49c

    SHA1

    3cb6aa4d6f3ee967ad924de077feb25ecd7f1526

    SHA256

    c3a704666223d039a73df2cd32c5ad7a5aa721fa50334ab5af5c5b0fb14ee596

    SHA512

    6246b98c9b70a72c4f6435c847b0a33c909e2707e2b6e5358e57427c382619d73e06ed5ef1faad8a378c1240174044c6e6b01931d48b5c2b1353618d5d10bdfd

  • C:\Windows\tiwi.exe

    Filesize

    137KB

    MD5

    506b603c161fbd3816d3033c4430a42f

    SHA1

    2f1adf598e71cf4543574596bf1c148a828f7018

    SHA256

    66ebeda303fd4df727235ebe7084e58253d66530d35c3fbd54d23c29b8c25006

    SHA512

    8fb1ee09832ae0d83996de933a1fad60b10056714a26e8498e1868c2402a2358d60057030bc8d13d026639ab6d8a7da9b8a457ecb2bfe390f4e05dcacaff7506

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    137KB

    MD5

    9097e344afa0929af34f89c767446001

    SHA1

    c3a20d958afa9c26cb6061f2b7f4024a02958846

    SHA256

    e42b3b440dbd586253080356d42b070bbf85da022a036d4ebe22b556d5606ec3

    SHA512

    91cd60d685a7f011de49be26421487f2f383a368467d1281fe5cbf8d61037e979dcdea259a731af186908be72dc5a3d79e8e5d4f88f83096a15fbb534b63954c

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/432-277-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/432-102-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/432-375-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/848-372-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1284-302-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1884-310-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2068-316-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2168-296-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2268-333-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2400-317-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2504-289-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2576-156-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2576-159-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2728-377-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2728-116-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2728-287-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3092-275-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3092-184-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3372-376-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3372-281-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3372-111-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3432-318-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3540-373-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3540-347-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3564-346-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3576-273-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3576-98-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3576-374-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3600-219-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/3600-282-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4056-293-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4304-378-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4304-121-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4304-294-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4324-290-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4324-301-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4532-303-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4696-331-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4696-344-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4768-332-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4804-345-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4852-343-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4928-312-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4980-0-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/4980-125-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5032-276-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5036-300-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5076-182-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/5076-168-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB