Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    120s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 00:59

General

  • Target

    01b91ca24688e63a0b93bfc1ed0bafd0N.exe

  • Size

    488KB

  • MD5

    01b91ca24688e63a0b93bfc1ed0bafd0

  • SHA1

    ae614b4dbd9513af82e0e30e2c8776b4e60115a2

  • SHA256

    79a43e231e92ac5ec57ac1bcb3ac36f8fdac3d354c82a42a379b4ad402c6518f

  • SHA512

    f17bea055087e90c33743af5b38a0d79620ff35594da881c6ddecaa782334de128ad02e89920f3bd362e4d65d4ef27683c1aa22958d07d7e55f042371e581769

  • SSDEEP

    12288:V/MA/MP/Mx/M7/Mx/M4/MpBE/Mk/M2/M1:VfK2O2HIBEd7M

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 12 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Disables Task Manager via registry modification
  • Disables cmd.exe use via registry modification 6 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies system executable filetype association 2 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 18 IoCs
  • Drops autorun.inf file 1 TTPs 6 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 40 IoCs
  • Drops file in Windows directory 26 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 54 IoCs
  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies Internet Explorer start page 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of SetWindowsHookEx 36 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01b91ca24688e63a0b93bfc1ed0bafd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\01b91ca24688e63a0b93bfc1ed0bafd0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Disables cmd.exe use via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Modifies WinLogon
    • Drops autorun.inf file
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4072
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4372
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2076
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4068
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5108
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2960
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4328
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:5092
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3296
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:5112
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3516
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4948
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:800
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:2348
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4716
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3264
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2276
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:228
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3464
    • C:\Windows\Tiwi.exe
      C:\Windows\Tiwi.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:548
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2204
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4496
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:4032
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2364
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2608
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3696
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2672
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3524
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Disables RegEdit via registry modification
      • Disables cmd.exe use via registry modification
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Modifies WinLogon
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:3076
      • C:\Windows\Tiwi.exe
        C:\Windows\Tiwi.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1436
      • C:\Windows\SysWOW64\IExplorer.exe
        C:\Windows\system32\IExplorer.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2812
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\winlogon.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3616
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:696
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3128
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1828
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    72522140bc191de812a7bc8f720115b1

    SHA1

    b7cd4fd3e8b1ac79f13376b0ebdd47240e48d2b6

    SHA256

    1a4ef1202ffff42853bae0fa490aebbd35629dd3a6bd7ddb91c300e902212a7a

    SHA512

    6b4145957eecee1584d5b1f3276d5a4c59781d66fe0821ff58b7ebeb8a18ab030224c52126feec7b9d0e6f7e411bc86b9ae7efc9dd52cad2b78542cf22411f19

  • C:\Users\Admin\AppData\Local\WINDOWS\winlogon.exe

    Filesize

    488KB

    MD5

    9ae85e4152d9c364800e65b070bddf95

    SHA1

    51aab133dc4fbd938f5efdc73f584cb76a43d1d3

    SHA256

    4e7585e4c02fda1e7616f44381640142a1c3f61f22f4ebeb08b2f3f315c6c63b

    SHA512

    15bdcb0fad42839205cf995b408b64ea86b8c5023ee88452fce6d0d266bb60cda0a6f491c6d676faf61402a41abfc064931dd45aa03954499ab2cf8e7effcf5c

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\cute.exe

    Filesize

    488KB

    MD5

    631de077bfa0a08109e2c96ae36597b5

    SHA1

    298088d6e94a540d68f1a46427cf344ec2b504ff

    SHA256

    4026f14a536636c205458c2e4ca3770bdb545120fd7271e5c9a824fe3a473859

    SHA512

    6eb62f042959c9431ecb6d9e71339b807846e6a277ccf361bc423704d72141aa06c0fe6d032f6a0b4185b2567f605d05de781b2489b288641353937f3eb28372

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\imoet.exe

    Filesize

    488KB

    MD5

    07bf2ea0f89eae9dbc6132cde666ac9a

    SHA1

    9edabc52a594d93f85b70fceadc4fd57a10b9610

    SHA256

    f940dbf96c0301ace296163b5a6e00010f1076b0e2eb82c30888aa871b89ed05

    SHA512

    ee11733277691d460a9cafb3db16272b65c662c5ac8ba201f4abf1b2e016df458af2623171620d6cc044cc10fa4f59637725faf982bb79c88f62a64828d1bd1e

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    a5013e6be070f5f042717338d89a1830

    SHA1

    279a80efeff67681aff1a6a9d46e5a5085d1ef04

    SHA256

    569387b3ae034ddf0301dee4e2e1f0368f6812a3c15421288c40a54bd758f7d2

    SHA512

    069cf2eccda251fff9d2429b2f3357d23f9281810072e289aedcad411685e92286669550ce0018c43920e97405df81d4e6c75eeddf49e06f3b7d1ce9d9d9cc6f

  • C:\Users\Admin\Local Settings\Application Data\WINDOWS\lsass.exe

    Filesize

    45KB

    MD5

    0495fab57e22cb46f8671f73ef9934bb

    SHA1

    66907b05529ddae77b24db30c52d75293ea08c0d

    SHA256

    9b68f7b50257480396c9c6acaca915e8fef129a592407977cb4a9df890fc5a47

    SHA512

    f18e1ee981be7430ea05b37ef13c0b821316bd9040d3592f8dee5fd0dabfc219966765b8d412479177a7b74aa830aadad61227528007312b9d8a1971d5d31b2d

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    aa5a795a4b3b965dbbf68f5626d27c06

    SHA1

    25d359d02528ee4c6a6e065438f7ab92ab81c14e

    SHA256

    f2cf29dafeefc5cdcb3d57a6cd614864f6afde27ddffc12b8261856cce5aa250

    SHA512

    d34711f855f532d030632bc472390bc9d529ca3bdca73e0e544763105d25e6756b8496f19b30fd66a1281dd8f1aa380fd4daca8fa99c017a244098ad237ba1bc

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    488KB

    MD5

    a3ab63188ef12f2e588e1d86f136a8e5

    SHA1

    89cf88280380ca5fda69dceb877fd8c6556c61ec

    SHA256

    0211cea4e1c248f8f052733f5d316977aaae6b8f5ddbece13f3ad4d865f4aca0

    SHA512

    1747ff1256d2cf867951d76c561b7809b8d9c3084fc2fb0cd13059ae683520d0d703e1f1ce42a3c725fa9f76c68e3be98e0b974cade63647cd6e4ed6aa214953

  • C:\Windows\MSVBVM60.DLL

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    488KB

    MD5

    ae24c9d029fad4ee86ac3845a03a43fd

    SHA1

    7765463d83fa3ab160a23a15e14d5575fc8756e4

    SHA256

    a95a8b5493e1ac55c8fb8318e7233682d39264c2cc4de47fe8d763b3b2ec42c0

    SHA512

    68b70d5416a70f0939e8cd9202af4120869be6f5ebf82c85380dec8b88a9d4236b0faa287fb36b6b1dd8f93dba5ae42ca75d3ad5186f351ff85675997887c092

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    b22ddab053da70fcbd000fcb5e50204f

    SHA1

    05eb5f18519e146bd869cdf2f25e646beff266dc

    SHA256

    05d5a286a14d63fa90a66b03ba683bd7b97d0136537aa46727ef179a87becaee

    SHA512

    127634f02209d66b94a58a31e7cedbb54e6469233a6d855edb727f8417fbb6a91cd373e031ce9aac2bf9cfab0d2698819f82606d41c59041bae0670fb52dec79

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    ece30d9b1360f2d5b81cbb349a4ea66d

    SHA1

    f3e6d74ebd8d5fc88c74eef1df1f3dd1fcf27540

    SHA256

    ee1c24112a9597d091a23b276520913cac5996ae64f224cfcce49fc81957d2fc

    SHA512

    aa2cee0ba1b311b52e8d04bb3e38c8af333369ab7d2f4592e398b9e82c14390096137220aa9820602b5bd115d24d0c57694ccbf44caa29669942fac7ba156b12

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    d6fdd2761f47ecfafa9cd2368a593191

    SHA1

    3d795c4dcf1a66f470a56d5f06d2cfd7ad985409

    SHA256

    b1f58122a5390212711c2838b1beab17f8687bdf349eb9cea92f225bbb2fea6b

    SHA512

    a1ef38e6386abcbf2bcff2eb826a2f090327e5edd72c3a0a9e44fef6fcfff7355e6e8ba8e97ce41c4db46f3f423694a989d27a71404568f661c16b056d5919be

  • C:\Windows\SysWOW64\shell.exe

    Filesize

    488KB

    MD5

    01b91ca24688e63a0b93bfc1ed0bafd0

    SHA1

    ae614b4dbd9513af82e0e30e2c8776b4e60115a2

    SHA256

    79a43e231e92ac5ec57ac1bcb3ac36f8fdac3d354c82a42a379b4ad402c6518f

    SHA512

    f17bea055087e90c33743af5b38a0d79620ff35594da881c6ddecaa782334de128ad02e89920f3bd362e4d65d4ef27683c1aa22958d07d7e55f042371e581769

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    1be79b3750ea0e098393d8c3439cc860

    SHA1

    25f1ad49bc4f51567dadee6a42b02b54bb2106d0

    SHA256

    2ac388c820d7fe585d46786eaf0b2f91389a0eced4692df06a42285bda1cb799

    SHA512

    d51a0cf809e108913c62b0195968d803316ff492a157bea23b48711b07e5e22b9efc7f653c558c13e2a072cd6bc8603c154a70b2a9dcf1939ba30b1296fbf4bc

  • C:\Windows\SysWOW64\tiwi.scr

    Filesize

    488KB

    MD5

    a866b6de2216a6a98cd5e44349a1ba58

    SHA1

    f9c054c756aeaf18530b54c3eab6ce5e6e20d2ab

    SHA256

    11e1789addb5d81ecfd6b4b8e9b67972f77b8dc12af60cb146812d6c3b70bf98

    SHA512

    618f1126cf969ad9f88574bf336047ac10e1f519af58ca0acbfec6e05196c80ff68c0465de8f41dcb0b181a45fed98016d0c931b2155f63f293c735b90530d38

  • C:\Windows\tiwi.exe

    Filesize

    488KB

    MD5

    a7bd349e35f3c97464bf850af242bd4a

    SHA1

    e86c5cbe92328c8741b12c3754c5e3f4cfaed1a1

    SHA256

    a6304596566e5ef35383ef7160dda95d9ba84855be4af8126db8a7ddc9a6d9b2

    SHA512

    e8db74ffc82d8e7a5909ee8e53369d1e38af4918e1902d51a8dd1d73a48dbb9ec0ad0fe47c384b35b46039bd711999ea5bc19827e5cb94f8740a7499f71a3276

  • C:\present.txt

    Filesize

    729B

    MD5

    8e3c734e8dd87d639fb51500d42694b5

    SHA1

    f76371d31eed9663e9a4fd7cb95f54dcfc51f87f

    SHA256

    574a3a546332854d82e4f5b54cc5e8731fe9828e14e89a728be7e53ed21f6bad

    SHA512

    06ef1ddd1dd2b30d7db261e9ac78601111eeb1315d2c46f42ec71d14611376a951af3e9c6178bb7235f0d61c022d4715aeb528f775a3cf7da249ab0b2e706853

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    7a789e4199ae57272bfd780789d94ca3

    SHA1

    a0d3a4eee88754771d40e180315b9f94f77510ba

    SHA256

    83257ae8469c4afecfa26a9b8a78995bd82e4cc4cd2aa4acd785ccb99fac145b

    SHA512

    13e1937504d9d06bc396fa4ac5709dd91460670e9feaf0c3acf4b2021a22cefa4207f8ab92894371ea2e57d6c4def2eace0b1f8caf5c23e4803bf2da50f6758a

  • C:\tiwi.exe

    Filesize

    488KB

    MD5

    a7e7b89358ecd987df044d063a207031

    SHA1

    ca48e9f4575ecbc30b8724a6cc2ac9618d110a08

    SHA256

    1140e2d215705b5ac93768ddeacfa63affad9dc20c1b9a15d46a2e01952a165e

    SHA512

    bd5b2bae0534286286979784abc0ade28f7a3a092f3858b02e79297bd4e1c56bf1340f31c2861a3314fb57bcf9653ad94a7bc62f38137d39fae212abc2e201f2

  • F:\autorun.inf

    Filesize

    39B

    MD5

    415c421ba7ae46e77bdee3a681ecc156

    SHA1

    b0db5782b7688716d6fc83f7e650ffe1143201b7

    SHA256

    e6e9c5ea41aaf8b2145701f94289458ef5c8467f8c8a2954caddf8513adcf26e

    SHA512

    dbafe82d3fe0f9cda3fa9131271636381e548da5cc58cd01dd68d50e3795ff9d857143f30db9cd2a0530c06ce1adef4de9a61289e0014843ac7fefcbd31a8f62

  • memory/548-193-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/548-148-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2076-189-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2076-211-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2204-217-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2204-194-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-284-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2348-110-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2960-307-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/2960-295-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3296-258-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3296-269-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3516-290-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/3516-285-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4032-409-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4032-272-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4068-213-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4068-266-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4072-0-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4072-270-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4072-396-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4372-96-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4372-273-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4496-259-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4496-219-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4948-299-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/4948-293-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5092-102-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5092-276-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5108-291-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5108-277-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5112-274-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB

  • memory/5112-282-0x00000000003E0000-0x00000000009DF000-memory.dmp

    Filesize

    6.0MB