Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/09/2024, 21:19

General

  • Target

    83e301b31b019b229c64aa33b6c15420N.exe

  • Size

    488KB

  • MD5

    83e301b31b019b229c64aa33b6c15420

  • SHA1

    99a5746b0467147bd6611fb7c8f953f0149d7d6e

  • SHA256

    7184edb4daf97a850035a3f8e38a7fc750057c064910251d1d0e19e3178ea088

  • SHA512

    4159cf739455cb8f6b4e41e8c4f16a24c77dbdbe577512fcb3de2a67480728e3095b802e192fcfe8486d6a55c8809e0fb4fe70b2964a2fbf82cd391b747e674e

  • SSDEEP

    12288:V/Mq/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:V9K2O2HIBEd7M

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 8 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83e301b31b019b229c64aa33b6c15420N.exe
    "C:\Users\Admin\AppData\Local\Temp\83e301b31b019b229c64aa33b6c15420N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2376
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4696
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4956
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1848
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4032
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2528
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Modifies WinLogon for persistence
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • Disables RegEdit via registry modification
        • Disables cmd.exe use via registry modification
        • Executes dropped EXE
        • Modifies system executable filetype association
        • Adds Run key to start application
        • Enumerates connected drives
        • Modifies WinLogon
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:396
        • C:\Windows\Tiwi.exe
          C:\Windows\Tiwi.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:3780
        • C:\Windows\SysWOW64\IExplorer.exe
          C:\Windows\system32\IExplorer.exe
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:4768
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2156
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1676
        • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
          "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:756
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4128
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1788
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:316
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4072
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1688
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4020
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4304
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2544
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3320
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4800
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3288
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4708
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3232
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2180
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2216
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2648
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3260
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2820
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1036
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4772
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3140
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1548
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3696
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    c7868f7a46a162af628a462fddef1f1a

    SHA1

    d3b8ebfe5d6c4eeba449e1238eb87eefd814f2c0

    SHA256

    36146b863b2ea25539b10e0120bec8b2ee68956ee07ac188895b2e08edf534a8

    SHA512

    931e207b4b4f09da0303823909dd7cf68fb0bae480c59a38c422864020b2e99dd9556dbe149029038817526b744202ca069e15c6baa3011447406c745651543f

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    af1c1daef0019989a682c38c244b7fde

    SHA1

    0a6255ba7924b7f70ed87a50d93f697554c44d21

    SHA256

    2c07130666d7c1041bce74ab7e2c733014c8e5739f3ddc6ac6c50157e9477ec7

    SHA512

    28ed0e0d012308e6240cfa28730b6b67eac3174c02ae7ffdba6ec6f5686b74a96f212abf265b2e642f4f0c03b21bcaf7d227aee9dc40028b66ea7bb645fa4637

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    edddbedbd567d5960a81fd3539badd12

    SHA1

    f3d8ccb89b619a7542508ff8335f254aa4e5fb7f

    SHA256

    d0f2ef2299945df01aef28285d21cb87236b476a039f7c2bedf160d7529605d2

    SHA512

    a9b89f5aae8a90bce849fe59509ffd2f4eb15b97bd5fe2af0e8f082dd7e57e441f307dce11758fb435c89e1e867f0fb130ff6b74059195e1e63baed890a7ff6a

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    9e193696e3037a93610dd2e4c2d8d7e1

    SHA1

    b2233e902f9dd862f4efab5a6f26b8bd1d6741f8

    SHA256

    7f929607024b7dbf0dac1c249e631b77f26090286bbbe51133f012c961afa9b0

    SHA512

    9e5b106346b248fb98cb7878acfcdf48190a1a38b4efeca016886684ff97929e6b6c6ccdbb9293851fb01a608d93f706d884bcec448f0f6b145a546fe33735bc

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    844141a25d31adb55855689ea43a97f1

    SHA1

    f0b698a03a117db87803d4101a88abed6faf9cc3

    SHA256

    7e1b9900cc80346ef2cb178394f6e6e38f256c34126ee194d5bc3897e92847a7

    SHA512

    56bfa0fd41f6128df3c1c35493bffccc5a320dd636f960d19a92db1738d766703c4f0be02f491e075f064b18d72cf28e44f766a9ad499216007ba21edbefd823

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    e8f318c4fe23fe722ce4cb6d370e6a0a

    SHA1

    315348480f46f126a586a96daa41563341794460

    SHA256

    f76f045b894510f5b523a2174be67527bbf9428db369b54c2596b9f77e374736

    SHA512

    b1e694bff6bf241e8e051f4c6fe2c080f7e894f84195afa11c4eb31512402a7e44ce1cb5c405180e58150a720c56080b18eaca94735b81ea679a223f2a187d05

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    e2b32178e20a3c7b4392cc18b16e0dee

    SHA1

    f8bca68f222b779643dbcaa31792f1f09832910a

    SHA256

    da282c6416dfc5f8ac71920d58c2bbeeff37fcce12bfc2d55a1cf1d462d8ddb3

    SHA512

    4cf715e5bd877adf2296589ec71750e81e5fc6ab6d62be949c98891139bfe531d6cb809742681018b9b7f4324a53d13b08454aa876b10c37fdeda93df96743d2

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    541884f9d4a64638736ecf1c9b568eb1

    SHA1

    f8c45b8faf3b8ea2395bf5d782ab2d5fd43fe454

    SHA256

    841c558aec60b449763a5fef81b64234e989cfa2bb0b67dabc1fafffffb9ab6b

    SHA512

    6ad1471a0625b06eafc636c1926cfda17aced733b3e16417592644cda3dc70e9d647c530ca57f5d78dbffc5cecc4ff8d25fa5e0f5dd8daacb4b2ca9263996ca5

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    51466c464f104d6524417afc450bbe92

    SHA1

    fc5eab4f19c7b3b2b17c04413e205db98ad89cf5

    SHA256

    bb2e0aff82f84ff3de2883397660657ba7266321d3eee7620bada0166dee698a

    SHA512

    0db790cc671f25dca7ff355aa2e8a7a4a30ba37f2f327c8da10a859f68954def2fd3d1c58baae15449f8943daad9fea2375cd25f72ba32464cec6aeeb0ab2a15

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    4b54fae539740f99e5d42428fca64580

    SHA1

    5db7a82f8f3abc00849a6c343592bc19bff8c5cc

    SHA256

    2758f991e77ca85599cd9181837ddc9d548a7b2a30c0f989d4c5e425b15c7125

    SHA512

    76a2bf975e51d474e977401bb29a960dfb740841629d9ced6cfed3beede871d6ab44e3f5f82a644f7050dca4ea381bfbe1e7804f64bd9f1646db7e0a9f96f3b8

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    45c5233b70f4ed362042fc3f1eb9794f

    SHA1

    f55d02ac4934b822da8ac2347a08df694917d16f

    SHA256

    5b505550fcd14df51c079b887e5e81127c102c2e24cc006c3df1a8ac6d52fde7

    SHA512

    6bfc4bde143cd4246af359e631735f169e8f75004ce24230c5576358bd72b49317791d20151169570de0fd5c99f36abd37fc27da0fd3e94a109a41c077e4fa47

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    fd91f665aa439191931a316c040b8fd8

    SHA1

    f272f01aac056d35f91f1a6f20c106320b96df99

    SHA256

    424dff26a7d1a792b9c499813040f8e2571c697e4dcb35fddc75e605533c7f91

    SHA512

    1ec3f3eb65ffddc9838882f3b3a8d7819d18c6545e2a32c3f5928371214ebe0c2fe83d2f476184abd4b1b6efb248945a14762b66a1002de135cbddd705487115

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    a4cf53263fba062141f2c4b9d43ff0c5

    SHA1

    2598209f09c9e129257faecb78812832fbb2ccfc

    SHA256

    cfcebdd145582575958a5ba5757e41b4129aaff5d3d37dab63b5ebbe35e9f36e

    SHA512

    e1add35ab360ff9e220d98aa513280b704dcf62fc2a954b6fd0d9a4bff5650b3ebdebed9781b691f877f199e41246762b2ec8a37ed27efbb085c53cbe92e1e83

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    94a6ed89eca04b1a9d108ea45d690b7f

    SHA1

    12fb87bb1a2ba2f07fefdd1c9baf395a36a38ccb

    SHA256

    2f4ed1c8e7282b4f82a54c70ff3f46d068fdd7c0b2b95359c057a12a60b101f1

    SHA512

    c54a1f75eeb38941b1982738eda90e7c23e26c5e5d2d7e07e28b15f66ea164712395108ef4648b22d786d3dc688a0f599617568abd0c32a68c11b2d5d77a5613

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    83e301b31b019b229c64aa33b6c15420

    SHA1

    99a5746b0467147bd6611fb7c8f953f0149d7d6e

    SHA256

    7184edb4daf97a850035a3f8e38a7fc750057c064910251d1d0e19e3178ea088

    SHA512

    4159cf739455cb8f6b4e41e8c4f16a24c77dbdbe577512fcb3de2a67480728e3095b802e192fcfe8486d6a55c8809e0fb4fe70b2964a2fbf82cd391b747e674e

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    f54d2f8da9e31047282e845b9cb8f4c3

    SHA1

    02e199f72f4c8f7d10b8aedcca267eb71b9ac4c8

    SHA256

    9614f8251088fa478e9a7dcfdb8fdf61fd80881aff552bf31f6cc447c131c567

    SHA512

    e582e1c819e423f6954695cb087ddac23512966c1f70a21ee5eeabbb05b4c34cc8b277526942dffbf4f22c538c7acd3b5a53cc18b15223365397362d0e50b2c9

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    012dc08800574414d9c6cb2893d52fd6

    SHA1

    33a3659d3f84afc0880364f0fc38112eec8d9268

    SHA256

    e85c9602994cc07f43d9f1659d38ad1c465695fc9bcb1c963a7b03328673b0ce

    SHA512

    9c4938892f5919f9f2142e1c313622464e3ed0899132bb514c56087c51213f3277d6ec6bac0ebe7b16c87ff6ad52ef9502c170ad9ba7c39b668cbf99e6981d36

  • C:\Windows\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    48e9da1fde5f3c3cbc8e0176d518950e

    SHA1

    24904950fb017581004344b87f46c86cf63779dd

    SHA256

    983646098968d8a0cc4d21659f570e01b05f7b6767c5ae11af344ecc09db8954

    SHA512

    5703b308ea9bb1a36c6449c0d58ed9c8134265f13558f48578945646fca61fa795e811f9f82147a5a897fb9d26a54ed8b50cd472975e550c7a74538e161fcc66

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    392423f824af4ca25b0b298aef2543d0

    SHA1

    22bc9fc15b377ba17d5aa9f264010a0d00052045

    SHA256

    ec7e28a9ccfa7703bade586cd063879f23619284f7618a5578f569993a733091

    SHA512

    400aff1bbb5cc502a119d9d04b12a374a9e49b7c86bd45cbcdca0943a86d67d6a59fbb8cc7bcaf88f5d0ec63f21500dbdbe3b67054df6f6c7e1e388550a48f8b

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    1bd2548ed1482d32d91f717e71b7cb9b

    SHA1

    e8c78d0c39e6148286044e5c05d739c771f03276

    SHA256

    b62d0af9eec731502c360e3a963ef3a40e5bcb808f9e3eaafb27e2c91107e632

    SHA512

    1862e64ec4395ab300b07ddbdbacb5a0802b276d4cfce603dcf6b2948adbbd663361fa33ce15e9fa7b0883de815175b2320572f33c1e2f0e325326975ef77a33

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/316-317-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1788-258-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1788-294-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1848-214-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/1848-259-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2180-194-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2180-217-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2216-283-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2216-219-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2376-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2376-408-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2376-282-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2528-308-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2528-311-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2544-298-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2648-413-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2648-295-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3232-148-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3232-193-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3320-299-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3320-306-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4032-319-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4128-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4128-292-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4304-296-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4304-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4696-284-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4696-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4956-212-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4956-187-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB