Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    159s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    24/02/2024, 07:15

General

  • Target

    IriunWebcam-2.8.4.exe

  • Size

    3.9MB

  • MD5

    2743f081c2a4369f0a50fca6ac035d13

  • SHA1

    8a4968da973dead25a678404bf2e6772b09381f5

  • SHA256

    2f0a2fae5dd7a296a92a58906a100b66575912d90254770e4bfb8923623ec26a

  • SHA512

    e48ad69fdb83efdc0d8a79aaacc783fcf1be305a8d8628e8888114a275fa8333cc92539045b63878bf9da63300feabce0d5d87b0668fb3e07d893902cb638c19

  • SSDEEP

    98304:NkLPf34mxE/CO7+wFws3ZWaPPkRqM48wAPdv0e4gWoJ0Rh:+PfImLqisY0SRv0e4gHJmh

Malware Config

Signatures

  • Downloads MZ/PE file
  • Drops file in Drivers directory 5 IoCs
  • Executes dropped EXE 22 IoCs
  • Loads dropped DLL 64 IoCs
  • Registers COM server for autorun 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 48 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 56 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IriunWebcam-2.8.4.exe
    "C:\Users\Admin\AppData\Local\Temp\IriunWebcam-2.8.4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4784
    • C:\Users\Admin\AppData\Local\Temp\is-1OPDH.tmp\IriunWebcam-2.8.4.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-1OPDH.tmp\IriunWebcam-2.8.4.tmp" /SL5="$60082,3213621,845312,C:\Users\Admin\AppData\Local\Temp\IriunWebcam-2.8.4.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4992
      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\netcorecheck.exe
        "C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\netcorecheck.exe" Microsoft.WindowsDesktop.App 6.0.14
        3⤵
        • Executes dropped EXE
        PID:4912
      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\dotnet60desktop.exe
        "C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\dotnet60desktop.exe" /lcid 1033 /passive /norestart
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3940
        • C:\Windows\Temp\{F78924BB-3683-4204-AF05-84CFFC441E2D}\.cr\dotnet60desktop.exe
          "C:\Windows\Temp\{F78924BB-3683-4204-AF05-84CFFC441E2D}\.cr\dotnet60desktop.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\dotnet60desktop.exe" -burn.filehandle.attached=564 -burn.filehandle.self=572 /lcid 1033 /passive /norestart
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:1432
          • C:\Windows\Temp\{E1DD51C4-CC8E-40C7-8B98-BCF478A98D45}\.be\windowsdesktop-runtime-6.0.14-win-x86.exe
            "C:\Windows\Temp\{E1DD51C4-CC8E-40C7-8B98-BCF478A98D45}\.be\windowsdesktop-runtime-6.0.14-win-x86.exe" -q -burn.elevated BurnPipe.{22B2D77A-A41D-46A4-9646-B08E3F6D3BE2} {2CD5BF4A-E8FE-4794-9265-069F9C2C3D3F} 1432
            5⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Modifies registry class
            • Suspicious use of AdjustPrivilegeToken
            PID:4416
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" remove ROOT\IriunA0
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:392
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" remove ROOT\IriunA1
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:3280
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" remove ROOT\IriunA2
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:3796
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" remove ROOT\IriunA3
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:2220
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" remove Root\iriunvid
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:5052
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" remove root\Iriunv0
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:1928
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" remove root\Iriunv1
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:3052
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" remove root\Iriunv2
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:840
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" remove root\Iriunv3
        3⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        PID:4964
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /u /s video32.dll"
        3⤵
        • Loads dropped DLL
        PID:3408
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /u /s video64.dll"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:3376
        • C:\Windows\system32\regsvr32.exe
          /u /s video64.dll"
          4⤵
          • Loads dropped DLL
          PID:2196
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" install iriunaud.inf ROOT\IriunA0
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        PID:3316
      • C:\Program Files (x86)\Iriun Webcam\devcon.exe
        "C:\Program Files (x86)\Iriun Webcam\devcon.exe" install iriunv0.inf root\iriunv0
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies system certificate store
        PID:3048
      • C:\Program Files (x86)\Iriun Webcam\IriunWebcam.exe
        "C:\Program Files (x86)\Iriun Webcam\IriunWebcam.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:796
        • C:\Program Files (x86)\Iriun Webcam\adb.exe
          adb.exe devices
          4⤵
          • Executes dropped EXE
          PID:4352
          • C:\Program Files (x86)\Iriun Webcam\adb.exe
            adb -L tcp:5037 fork-server server --reply-fd 240
            5⤵
            • Executes dropped EXE
            PID:3444
        • C:\Program Files (x86)\Iriun Webcam\adb.exe
          adb.exe devices
          4⤵
          • Executes dropped EXE
          PID:3168
        • C:\Program Files (x86)\Iriun Webcam\adb.exe
          adb.exe devices
          4⤵
          • Executes dropped EXE
          PID:1944
        • C:\Program Files (x86)\Iriun Webcam\adb.exe
          adb.exe kill-server
          4⤵
          • Executes dropped EXE
          PID:2576
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
    1⤵
      PID:4088
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3440
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding D62AF8F6F0306F56AA26F4A6C93A258C
        2⤵
        • Loads dropped DLL
        PID:1696
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding EBF13125C69A5A7C49D36AE58E9915F6
        2⤵
        • Loads dropped DLL
        PID:3028
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 6D522133687093899FC58CA836D7A7BF
        2⤵
        • Loads dropped DLL
        PID:4464
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 3E2189A023671470AB17D6324F977136
        2⤵
        • Loads dropped DLL
        PID:2352
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious use of WriteProcessMemory
      PID:5068
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{fb6bec4b-9f24-1f4c-9458-6c14f5198b70}\iriunaud.inf" "9" "49f3306f3" "0000000000000148" "WinSta0\Default" "0000000000000160" "208" "c:\users\admin\appdata\local\temp\is-ldjat.tmp"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4968
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:ed86ca115a9e2d13:IRIUNA0:1.1.0.0:root\iriuna0," "49f3306f3" "0000000000000148" "fe95"
        2⤵
        • Drops file in Drivers directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        PID:1944
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{dfe41c89-0e91-3a4d-ab7e-72ab06d1b4ee}\iriunv0.inf" "9" "45a8d7073" "0000000000000178" "WinSta0\Default" "0000000000000180" "208" "c:\users\admin\appdata\local\temp\is-ldjat.tmp"
        2⤵
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:4296
      • C:\Windows\system32\DrvInst.exe
        DrvInst.exe "2" "211" "ROOT\CAMERA\0000" "C:\Windows\INF\oem4.inf" "oem4.inf:741f41b526e253e4:Iriun:1.7.3.0:root\iriunv0," "45a8d7073" "0000000000000178" "fe95"
        2⤵
        • Registers COM server for autorun
        • Drops file in Windows directory
        • Modifies registry class
        PID:5004
    • C:\Windows\System32\WUDFHost.exe
      "C:\Windows\System32\WUDFHost.exe" -HostGUID:{193a1820-d9ac-4997-8c55-be817523f6aa} -IoEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-684e3702-2075-437e-bc88-49548c54a552 -SystemEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-d7b56e3f-bf4e-4011-a90b-bb0d0248ee19 -IoCancelEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-09a9b6be-518b-4c54-a550-93d377f5985a -NonStateChangingEventPortName:\UMDFCommunicationPorts\WUDF\HostProcess-94e850d5-f7e0-4365-81fd-596587da8d17 -LifetimeId:729a22fe-9ff0-477f-81b2-44e44a7fd5eb -DeviceGroupId:WudfDefaultDevicePool -HostArg:0
      1⤵
      • Loads dropped DLL
      PID:4464
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k CameraMonitor
      1⤵
      • Loads dropped DLL
      PID:3940
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:4804

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Config.Msi\e57deab.rbs

        Filesize

        57KB

        MD5

        028158a07492cb824c181d0d6d133888

        SHA1

        85bf2d30f9d81b085c12643c6ff13aba03b46a5a

        SHA256

        eb50480a58bff9da432a7d184d7db9188b45c271c2be718b65a7e6fd581a2171

        SHA512

        3dcd066eae2db4cef60995311271ed420dfa9a0a48361d8d6f84338eea4f20046238b954a0bcdf712cc689cdf49cd8342477942b408813527ae6470b3019a3bd

      • C:\Config.Msi\e57deb0.rbs

        Filesize

        8KB

        MD5

        3e049611bc1d242c6faa3701af1acd95

        SHA1

        dbfdc41ab849c0b42e3c1fb0040d86a7699a3282

        SHA256

        01c398110746b26b10ec47643b21cf77b8ac6a1202250b01d702c0edc2efa5d0

        SHA512

        1151331dc8bfd46ff6effcce1f3254973e0cbc9f2d3f25d9a831c0ebda7ad2790da2f050b15a13b31a59589bc6a6a02cc91b45b3a27ed62073148cfd29e1a0d2

      • C:\Config.Msi\e57deb5.rbs

        Filesize

        9KB

        MD5

        a5c216e06909577d8e492d42b83a8d77

        SHA1

        5ef31e62691e422ea2961fb53fc9117a0205ad6a

        SHA256

        0632d2af0838eda4b69c6fd375011b80baead9ecdc37cc7346d5765353994f44

        SHA512

        ad987679e25efe2354eae6ddad14daef1d4872373661ef6547c0a9947f8a6bbdc0a69164341571344385fd8e5ba2b4433e5d36969fd7c6c67201baf262374b44

      • C:\Config.Msi\e57deba.rbs

        Filesize

        90KB

        MD5

        a2806fc6ce145858dd380686aedf0eb1

        SHA1

        fc583833086ea59705a7381535c51c8f9edd89e3

        SHA256

        763acc203ef897e7039f3d69400f8654f4c163a77a7a39633591f91fac4b261a

        SHA512

        aeb3b4aed4ab9bedc336ce206f9fe6046bb2318ff6cbeb05e60ba82bd710f4b463e15615bd68f939f46999b70774db12275299d10ffcbd421c71c688fd545587

      • C:\Program Files (x86)\Iriun Webcam\IriunWebcam.exe

        Filesize

        180KB

        MD5

        d126f7dd067e1c2ebde5ed1279f2ce8e

        SHA1

        77db2e7596003defe5ae5eb3094bf338bde9118c

        SHA256

        24b4365048c826e8e6c4fc49ec0dc2e933aaf7c2ce9e0440d507cc326e31ddc7

        SHA512

        834452040c02ffc1fd9bb47b87f839489f080525b6fe25b45121dc3c750ff80fea430fed0e48e096bfe8036552bcbe63c9c93ef7eecca5721f7e1af176fcccea

      • C:\Program Files (x86)\Iriun Webcam\devcon.exe

        Filesize

        81KB

        MD5

        816c4e245b286b4e4903131f75a94948

        SHA1

        eda70c1fc8a461efb0e376d42e35a72b96175e4d

        SHA256

        aca1bda08690dcca930254f96f9185c776671a85a58ffa1b59cf16017546f218

        SHA512

        d0dc74956c57403c0638e6595aaf1c2eb75233997a15170b064261a5d3f1f525a3e35e13fef04c36cc20fd1d5d1cf000a5fb7a646bf2cf1cea73817e5d3335b3

      • C:\Program Files (x86)\dotnet\LICENSE.txt

        Filesize

        9KB

        MD5

        31c5a77b3c57c8c2e82b9541b00bcd5a

        SHA1

        153d4bc14e3a2c1485006f1752e797ca8684d06d

        SHA256

        7f6839a61ce892b79c6549e2dc5a81fdbd240a0b260f8881216b45b7fda8b45d

        SHA512

        ad33e3c0c3b060ad44c5b1b712c991b2d7042f6a60dc691c014d977c922a7e3a783ba9bade1a34de853c271fde1fb75bc2c47869acd863a40be3a6c6d754c0a6

      • C:\Program Files (x86)\dotnet\ThirdPartyNotices.txt

        Filesize

        78KB

        MD5

        f77a4aecfaf4640d801eb6dcdfddc478

        SHA1

        7424710f255f6205ef559e4d7e281a3b701183bb

        SHA256

        d5db0ed54363e40717ae09e746dec99ad5b09223cc1273bb870703176dd226b7

        SHA512

        1b729dfa561899980ba8b15128ea39bc1e609fe07b30b283001fd9cf9da62885d78c18082d0085edd81f09203f878549b48f7f888a8486a2a526b134c849fd6b

      • C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.14_(x86)_20240224071628_000_dotnet_runtime_6.0.14_win_x86.msi.log

        Filesize

        3KB

        MD5

        3035d4027db92eaeba795317ccec9315

        SHA1

        9fe5ac1d485a0f843d539552c3cead4c100bbefa

        SHA256

        fda1b752bd136c5ea78c879d54e34edf8f4de48a4b0d34583ee457cb7dc98d7f

        SHA512

        1860f0d59714d0a77651fe0bd350a71936638f52f19901468e82a88bc07a79fd5d0bdc131b2b0957b5ec7c74f2e8999679fc889fcce5565f9115d5109a03fd4a

      • C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.14_(x86)_20240224071628_001_dotnet_hostfxr_6.0.14_win_x86.msi.log

        Filesize

        2KB

        MD5

        d58fb7dfc03502bc415970b82ca87278

        SHA1

        3a35738ae4eedf0f654f1f3df7c690b4f83a7473

        SHA256

        58c1dd82252e3017c1bc92b31dabe5aa2353daf50f8d42715c1ac3eed7e8dbda

        SHA512

        bf99fe7bfc320d1aa8887fe84fda0494f16b01b3d0d56d583c77e1fe0f85862a4889424c0523f14e47b8b2ea7ab0130c58dfe5a31f8bb7387fbce3b757e9024e

      • C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.14_(x86)_20240224071628_002_dotnet_host_6.0.14_win_x86.msi.log

        Filesize

        3KB

        MD5

        a2bb3cc793977ec55b81f080c54eec8e

        SHA1

        195734e10adbf186660c921e71402dfd9d00341f

        SHA256

        d925a7d0ed1b6b514c9df3b2fb60bf9dd19904a536aebccbbb7e6ab0b7a4e4cc

        SHA512

        8c423b455e15576758a952ab780ea0ce65975e312342b5a3edb99095b16237a3d97ffe8fbe15fbc1ffdb497eed7846bbab6c0fdc52d59a612b6f3cdd27406607

      • C:\Users\Admin\AppData\Local\Temp\Microsoft_Windows_Desktop_Runtime_-_6.0.14_(x86)_20240224071628_003_windowsdesktop_runtime_6.0.14_win_x86.msi.log

        Filesize

        2KB

        MD5

        36078f92e8fe6052f62084b2e9ca843a

        SHA1

        ab494c09a0fdd410ed07b38a964414cc4f324ce9

        SHA256

        6367243f588ca0f00432b9179bb0869738c676b0d07dcc6b1358bd63191887f3

        SHA512

        344f694d382009dc42d1a077ab2dc11f8501e34d1c45692a88138d51b0d03441b5e51df86b8b724f6553575bf87a6ebe92fd0d6ee627ca0d9607fcf6ca76ef52

      • C:\Users\Admin\AppData\Local\Temp\is-1OPDH.tmp\IriunWebcam-2.8.4.tmp

        Filesize

        2.0MB

        MD5

        8c860813412d07cca77ebf933d879f02

        SHA1

        c3c1bb02c21eacaca1b8162b7fc001f2997cd6d6

        SHA256

        946b0c0b42f33fc42176dcfa50cd3dfcb2f2993673a003d2045978e13edbe3db

        SHA512

        1739ba35f329afc3823b210f96d32dd5819c2f3737492c30c45d5f273c25c9cd7221fa844c1e3985261f7afe3f01c26773235c7b4e7d5fd438b3a11f89115501

      • C:\Users\Admin\AppData\Local\Temp\is-1OPDH.tmp\IriunWebcam-2.8.4.tmp

        Filesize

        3.0MB

        MD5

        6fc7483e42deefbbe32bec4b97b8d69c

        SHA1

        35fb4b7fcac1e03f37de7ac2ed306f3f40c5eb28

        SHA256

        8bc4748c4c3d27d645af069eac99d9f1a1f1e614f203b36d60e520c09a71a453

        SHA512

        cc96070fa351a8bc7b0636f7279745aa7ac10b9ed049b401a3d2f8fd1c0777ae98fea1be81a510e1ca1fca53125b134497c73d48029d1d675319fb066640d0dc

      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\dotnet60desktop.exe

        Filesize

        17.2MB

        MD5

        847bf9a9d3d9040faae81b9feaf480d4

        SHA1

        7a8ef73cc564ec2a615ba6ba918e16244d0bdd2c

        SHA256

        c044dbc6701ed839b6387eef7ded7f5c7a306512e125536ef5cccf3323221e47

        SHA512

        a7315057a0a000afb211c2b747942d80b9adbe7f33e12a0c68baeeef47834bcd21e74cc11699e2a5b50d55e036edb61c372a928f48a6ad4ae0f0f78e56953626

      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\dotnet60desktop.exe

        Filesize

        12.6MB

        MD5

        2f4f75eebba8d331246b56a978da303b

        SHA1

        f2c9e7f3e9ed50efeb214c5c65cf098b7baba556

        SHA256

        68ddefcba93801323b5633e7414d2dde1c96c4fc6ee863a1ea3c878d11d54d07

        SHA512

        4aeb4ce1c0ae4a9e6ff910906df0de156c9c2bc031047a9f10a1ce602ae7ef9a9a12e95ff75cc55b8ffd71cb00f92ae4d57f22ce03ce59462eedfd583cd5a821

      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\dotnet60desktop.exe

        Filesize

        15.6MB

        MD5

        26fd5b3c6b64afe060fce2947e9b3a1c

        SHA1

        a6b97d37ab0a2f9ed421674e6c579db4ec39aaed

        SHA256

        77ec65f659a309e8d5f12c5ad034856e94e124ca0a6b1c20f5fe275d02d2bde3

        SHA512

        2d39acc6a70a139ae4c05a2755109611f9f12fe42ca22c387534779f3b8f00e047126d3ec5923f1a78c281374e03d12e2ca390c0c685e7e173a2496c090e1d4f

      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\iriunaud.inf

        Filesize

        9KB

        MD5

        50babc5474b2bc3310e69ec665df52b5

        SHA1

        e58fc1eeeb7fbed9dd5ec0838582f4a93304fc9a

        SHA256

        d9efc7dc0ea210ad25046a0396439b88355451c9f07515bf1902c25bf071b889

        SHA512

        ee519279d404463f87a123d87cb3d32c687122ce486f2858028c3c33f6542a58d812bd6a355a690c9f23b1046c5055a2fa84413a23d2db20352b1ecbac84c5c7

      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\iriunv0.inf

        Filesize

        5KB

        MD5

        4271ef4a1278916281aa01a97ae34e1d

        SHA1

        d3075d6a962ec57f9cf802ca28271b010451c285

        SHA256

        37c8dc4594d178624b407a8bd334e0477d1e84cefbb7b3de6994761fe3f32951

        SHA512

        d68c17170e670542468d434825fbb1b7fed2f5f9c04bf4c84c0f6d59c57be20675c5d4ceda03f90266f084635161593f459618a710a436a6bab026ddde614c65

      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\netcorecheck.exe

        Filesize

        107KB

        MD5

        92e65cd72cf9f57deeac5c0c4186a5bd

        SHA1

        b187a4f6c84193d17fd79506206955dd6fabe897

        SHA256

        ef10850b31b3dbe9ad6cf8cb55fb1f81a60ea9c5c0694b4b94b283601eb17c20

        SHA512

        ae70051d857d1a7398fced3e12ec708e5580d60a3e1a39e89f5fbafce7da499d5d47ed8402db5d21a0994354673c1ea82acb5f7cedd1703e3562eb378c3c7bbe

      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\video32.dll

        Filesize

        314KB

        MD5

        a00de9716d0fa0e90e0eb0ba3e2fbd87

        SHA1

        82b905d4067a556f09cbecdabf8a657ba49a988c

        SHA256

        88b1cd4fde23c0b57cec028b3931858d4ea13f759248b3a16c23c71f2d2f282d

        SHA512

        fa14002edb1eed1655a62373a856cb586fcd06f1a0d3fcb94396d0ee4b09ec10716a2b81fdf5781f9ae9a5ed86f96222a0d13562ca44ce355c157ebf2dbf8a06

      • C:\Users\Admin\AppData\Local\Temp\is-LDJAT.tmp\video64.dll

        Filesize

        392KB

        MD5

        ee0adcc0bda9520533b89576cb383241

        SHA1

        ca1b97ad4633f32b3799de8cc2a267280bd15f9c

        SHA256

        5fe4b3b4dd524d09fd123e609b0b6a711cb7d2523890d84aac380d32579844d3

        SHA512

        25237294668e06dfc116bdacaa962961c162387ba91a93bfa3e989bb48e16141ac896af31aee9e8259a848d231ae272ef64266ea24b0747f454c7b6f740de808

      • C:\Users\Admin\AppData\Local\Temp\{dfe41c89-0e91-3a4d-ab7e-72ab06d1b4ee}\Iriunv.dll

        Filesize

        127KB

        MD5

        030335d0cf19d7e5c62a26f2918b1054

        SHA1

        c9a725736f0cd2e33324f155f39461942e675719

        SHA256

        c71c3c69b58124f52e530d351d4f05a8e6165a4c3a36167c8cfe51b6656abe88

        SHA512

        48274acfdd036f620785c900da30e3f051dd2eb45fcbc7712c88e37858664e7a58cadfbc4bbc0742b81b24481df17e977945ee3a843c7bfcbdec106cfa041354

      • C:\Users\Admin\AppData\Local\Temp\{dfe41c89-0e91-3a4d-ab7e-72ab06d1b4ee}\Iriunv0Driver.dll

        Filesize

        34KB

        MD5

        f5e083e05590238feb8f8d3a887e80a7

        SHA1

        6b6ca4d8b393aca29793b31c5b7a376ffaefd031

        SHA256

        5bb81a26af1f1857ce64219abda9f8f8fc0679555cb5f61ff745870db8fbb4bc

        SHA512

        c698d1435fbea927798351a6986a4ad19a582fc9b9010f2b70b7e55ea6ef5c2fe9ae048fcf1aaa19e3b2e4854a4009eb1ac5f19c987bcdc95bbeac12a38a1e6f

      • C:\Users\Admin\AppData\Local\Temp\{fb6bec4b-9f24-1f4c-9458-6c14f5198b70}\iriuna1.sys

        Filesize

        45KB

        MD5

        d61b92b1e21dccde025cc922e83b0446

        SHA1

        a130113accda7de05478a73610af586b808e4615

        SHA256

        b49c2defc596902c2f3d1443b2332fcf0f33dd981e617815f55d5a1cbef70ec2

        SHA512

        27ee786cf8d4cf264cfb2bca3dd0699fa168a321bdbf1f2c0838e65b9db71ae3ca05005a23f1ef5422be2f212463d9287dc847ba63053913cea185cf3881afce

      • C:\Users\Admin\AppData\Local\Temp\{fb6bec4b-9f24-1f4c-9458-6c14f5198b70}\iriuna2.sys

        Filesize

        45KB

        MD5

        1ca069f7e6c11b637ba5ded2cee59455

        SHA1

        950c5fdbd138e632c9e92eb577d565a912044935

        SHA256

        781165c941363ca5f02e12475eded7ae54d3fd2c43a3d66612c73e3901cd45b7

        SHA512

        7220ed6ff29b8ffe8e9228e4fc82a94a9096ea6fab7630ad7a413e975710a8917f953330e15fa10e9fdd58229a97e4bf8f95a0b98fe899296e371fb36630042c

      • C:\Users\Admin\AppData\Local\Temp\{fb6bec4b-9f24-1f4c-9458-6c14f5198b70}\iriuna3.sys

        Filesize

        45KB

        MD5

        e2bea5605f2e2542de4a8fcb1f7fd2dc

        SHA1

        68fe032d5eef83acc5a598d0339eec7b1196003c

        SHA256

        ed9c2cafadc3f6a57db53aa9090f6b2f0756fcc08a441e8dacbbdd46c6bdc31d

        SHA512

        3656421217cdb87ab6d0cef4aaa8f69138c9df3be33fb691f71c49ac9f17e9420da93029b18f6d80270e0e532fa349d52fa8db4c535ae59a8ba06f70c8e07c5e

      • C:\Windows\Installer\MSIF703.tmp

        Filesize

        225KB

        MD5

        d711da8a6487aea301e05003f327879f

        SHA1

        548d3779ed3ab7309328f174bfb18d7768d27747

        SHA256

        3d855b58ce7da9f24f1bef8d0673ba4a97105a7fd88433de7fb4e156b4306283

        SHA512

        c6d1c938e8a0acf080dcab1276d78237e342a98772e23ac887b87a346878c376fb0af8364e52a36c5b949005aa3218308bc6193f8b580f622ef39d9955c7c681

      • C:\Windows\Installer\e57dea8.msi

        Filesize

        23.4MB

        MD5

        cdce3c41f8671a5e9787704677fa0daf

        SHA1

        e1ae62cdcc9fdd553f6c975ba061c218e31c75be

        SHA256

        af428490dcd56f107e9d348c4e2613e54d617f44455fa65dd36af4c493c4b205

        SHA512

        4b94a5719568479ee2fa47b8aee60f2db00053664d051347653b64841c465a16fb0448a33a52f3b13d05236cc03c3d7a039e9f2633291d9b6caeebe0bace2b61

      • C:\Windows\Installer\e57dead.msi

        Filesize

        784KB

        MD5

        73968a93329a8a3e08952edfb8ed5dc0

        SHA1

        67d82e4638dd70aa787f47ad39d74b75686a0965

        SHA256

        fd29a2269cd1ac89d8887836b5ede8813c975d2a339e5d1e50949d5ee8081791

        SHA512

        363d3ff72ee1ef9705310eacc973622b4ae2e937ff9f032af8233eda55da2e4002ca60486dc5dc23f6d20a1134a7dbde25c88157506859154045f51d71845104

      • C:\Windows\Installer\e57debb.msi

        Filesize

        20.9MB

        MD5

        aeb3dd4311c66cf395c3cb0f980bc1e2

        SHA1

        9a84b635154a97266dd7dbc975d86d613876a773

        SHA256

        03efa8a87ac26cb4a9e5dfdbbda76d4901b287bc0b42b3e61f96e31926bbcd9d

        SHA512

        9d9987c8188e34763cc08b0255012d5344508ab2b0e404f1298c373d7efb8dd534d9da9d245f9b143ec1083dd7f9f53be2cbfa57dc3f03d9220148c0f176ed0d

      • C:\Windows\Temp\{E1DD51C4-CC8E-40C7-8B98-BCF478A98D45}\.ba\bg.png

        Filesize

        4KB

        MD5

        9eb0320dfbf2bd541e6a55c01ddc9f20

        SHA1

        eb282a66d29594346531b1ff886d455e1dcd6d99

        SHA256

        9095bf7b6baa0107b40a4a6d727215be077133a190f4ca9bd89a176842141e79

        SHA512

        9ada3a1757a493fbb004bd767fab8f77430af69d71479f340b8b8ede904cc94cd733700db593a4a2d2e1184c0081fd0648318d867128e1cb461021314990931d

      • C:\Windows\Temp\{E1DD51C4-CC8E-40C7-8B98-BCF478A98D45}\.ba\wixstdba.dll

        Filesize

        197KB

        MD5

        4356ee50f0b1a878e270614780ddf095

        SHA1

        b5c0915f023b2e4ed3e122322abc40c4437909af

        SHA256

        41a8787fdc9467f563438daba4131191aa1eb588a81beb9a89fe8bd886c16104

        SHA512

        b9e482efe9189683dabfc9feff8b386d7eba4ecf070f42a1eebee6052cfb181a19497f831f1ea6429cfcce1d4865a5d279b24bd738d702902e9887bb9f0c4691

      • C:\Windows\Temp\{E1DD51C4-CC8E-40C7-8B98-BCF478A98D45}\dotnet_host_6.0.14_win_x86.msi

        Filesize

        128KB

        MD5

        06b35552106ca108227b3f2730ec1fb8

        SHA1

        dcc80bdf92e562821a4a86044b3a1dab5d7345e8

        SHA256

        74c6a88ec86ac183599eb4de3aa3e24571dcbf2811703a2789782f1868e9c036

        SHA512

        9f00f41fd097d227d377824bad3b65659505a80f463858b026e0e2eec61e9fa26869b6beb203b946478a7c580f346936738e8515803637ac5eb90d972c4bf200

      • C:\Windows\Temp\{E1DD51C4-CC8E-40C7-8B98-BCF478A98D45}\dotnet_hostfxr_6.0.14_win_x86.msi

        Filesize

        192KB

        MD5

        d4212b06586fd6bb50ad2b30431e6b94

        SHA1

        6e67f064317aa1929f494cb7caa4ec6015b0f43b

        SHA256

        adc72afba5c51e29731cc9ce1e0a1661f2fcc1c968b3d09740507e4f26a3e0dc

        SHA512

        a01d2e1ed0e0b170c29a375d231be7ad8fd0b033ba402538d1746ab72380f16071b06b23f846b79346d6a8b7de4d629ea410cb43ed1e91854948c1bc005fbe58

      • C:\Windows\Temp\{E1DD51C4-CC8E-40C7-8B98-BCF478A98D45}\dotnet_runtime_6.0.14_win_x86.msi

        Filesize

        2.8MB

        MD5

        46272168a1f40e0f95da60009c25df75

        SHA1

        61eec9e227acbc55a3b3b4b1411ffcc16671b1d9

        SHA256

        9dcbbcb48975c0239420585fcfc88139489bdba0e26f5a67023a306d25e95121

        SHA512

        c0bee2d676c654779e191dc5578e9f65d21ccf699b287bd5d1d3383a1eae2ce2cf472f448395817c608a0c37cfc4cb9fa9de4002a5e0b73786d3252c3409f4e0

      • C:\Windows\Temp\{E1DD51C4-CC8E-40C7-8B98-BCF478A98D45}\windowsdesktop_runtime_6.0.14_win_x86.msi

        Filesize

        128KB

        MD5

        3d942f68deeb5fc31855ce777a232415

        SHA1

        0370910fa09e32976c6fa3f246632a49fb3cb513

        SHA256

        b0ccdf29fa7eb2141c772b5c438b8e0ec600b51c8928edfd5538ab940676d3a7

        SHA512

        cacba2d7f052d1aade91722ea3c6d2eeb25102b083b4f2673712e8a49e2e8113af947a23d5df7a75ee6a1215d92d482aa1126b13e6825c627af4e18d25fddf5d

      • C:\Windows\Temp\{F78924BB-3683-4204-AF05-84CFFC441E2D}\.cr\dotnet60desktop.exe

        Filesize

        610KB

        MD5

        22b5e36f50b922e65d596451cfb9e6dc

        SHA1

        4249136f82ac8de814cb152bc84bd8a3e5d24939

        SHA256

        bcee8bdcdea15588bbe346568fbde57972d2267625d820c8f8acac10745f300f

        SHA512

        578fef393688e85279e12008bb169cd229fccac5ca8838fa71ac12315f7f775395da10159538bcabfd1b4492bc19424bdd485eeabbddbc92e2d83ae8892232a4

      • \??\c:\users\admin\appdata\local\temp\is-ldjat.tmp\Iriunv0.cat

        Filesize

        12KB

        MD5

        8c6428e1e0d27ad4cbc878ee4f391512

        SHA1

        824ab680fdcc8d1c8e708c2844e5ef38075b63ad

        SHA256

        808e291b7b2aa68632d06698bb70c2dd4d2bd00b726a83f7751b4418d6a406f3

        SHA512

        f2daf9f7348dac86819697d5c627346e55431bcce305afb42f377ea813bdb254657074dd5e07519367bbbfbcf53c3674c52b787cef821466bd1eb857c18eedb4

      • \??\c:\users\admin\appdata\local\temp\is-ldjat.tmp\iriuna0.sys

        Filesize

        45KB

        MD5

        5722ae97a72f9fbe12231ec9c8446e1e

        SHA1

        969603612f2d493322908aa5295b383a54e11129

        SHA256

        560093d6b6b1608cb69bff59656f29a4e487512a2cf654440e9483ea684400df

        SHA512

        a9d20879d9bcf63177064db6f8174bee5924d431e3325bb84a3190c6b33591cd3ca771bdf76aaef86302c60b2e7a38eb328b4322ef9219c83eb26a6f12d95be7

      • \??\c:\users\admin\appdata\local\temp\is-ldjat.tmp\iriunaud.cat

        Filesize

        12KB

        MD5

        df28ebf75e67e94211d99a63884215fe

        SHA1

        00a8c76f25769999721cbfdf19b9b2d266df2b76

        SHA256

        d3aab4b49b367f54502556a251b04026ed79dc5b18eb142b21cea13ec927952d

        SHA512

        51216e416e734b3fe32d398310b482d1207c5d5e529effee1177bc8f597d8af73060b6ec059acbaacb507c8ce52330575423d37efe8553951f04661bdb7d88d2

      • memory/796-1122-0x0000000064B40000-0x0000000064B5B000-memory.dmp

        Filesize

        108KB

      • memory/796-1131-0x0000000072AE0000-0x0000000072F0A000-memory.dmp

        Filesize

        4.2MB

      • memory/796-1166-0x0000000072AE0000-0x0000000072F0A000-memory.dmp

        Filesize

        4.2MB

      • memory/796-1165-0x000000006CF00000-0x000000006D0CC000-memory.dmp

        Filesize

        1.8MB

      • memory/796-1164-0x000000006D280000-0x000000006D31F000-memory.dmp

        Filesize

        636KB

      • memory/796-1163-0x0000000064B40000-0x0000000064B5B000-memory.dmp

        Filesize

        108KB

      • memory/796-1162-0x000000006D320000-0x000000006D3E8000-memory.dmp

        Filesize

        800KB

      • memory/796-1121-0x000000006D320000-0x000000006D3E8000-memory.dmp

        Filesize

        800KB

      • memory/796-1123-0x000000006D280000-0x000000006D31F000-memory.dmp

        Filesize

        636KB

      • memory/796-1124-0x000000006CF00000-0x000000006D0CC000-memory.dmp

        Filesize

        1.8MB

      • memory/796-1092-0x000000006CF00000-0x000000006D0CC000-memory.dmp

        Filesize

        1.8MB

      • memory/796-1089-0x0000000072AE0000-0x0000000072F0A000-memory.dmp

        Filesize

        4.2MB

      • memory/796-1091-0x000000006D320000-0x000000006D3E8000-memory.dmp

        Filesize

        800KB

      • memory/1944-1141-0x00000000001C0000-0x00000000003BF000-memory.dmp

        Filesize

        2.0MB

      • memory/2576-1161-0x00000000001C0000-0x00000000003BF000-memory.dmp

        Filesize

        2.0MB

      • memory/3168-1119-0x00000000001C0000-0x00000000003BF000-memory.dmp

        Filesize

        2.0MB

      • memory/3440-439-0x0000017206A30000-0x00000172074F2000-memory.dmp

        Filesize

        10.8MB

      • memory/3444-1146-0x00000000001C0000-0x00000000003BF000-memory.dmp

        Filesize

        2.0MB

      • memory/3444-1160-0x00000000001C0000-0x00000000003BF000-memory.dmp

        Filesize

        2.0MB

      • memory/3444-1125-0x00000000001C0000-0x00000000003BF000-memory.dmp

        Filesize

        2.0MB

      • memory/4352-1118-0x00000000001C0000-0x00000000003BF000-memory.dmp

        Filesize

        2.0MB

      • memory/4784-1104-0x0000000000400000-0x00000000004DC000-memory.dmp

        Filesize

        880KB

      • memory/4784-2-0x0000000000400000-0x00000000004DC000-memory.dmp

        Filesize

        880KB

      • memory/4784-20-0x0000000000400000-0x00000000004DC000-memory.dmp

        Filesize

        880KB

      • memory/4784-0-0x0000000000400000-0x00000000004DC000-memory.dmp

        Filesize

        880KB

      • memory/4992-6-0x0000000002910000-0x0000000002911000-memory.dmp

        Filesize

        4KB

      • memory/4992-26-0x0000000000400000-0x0000000000716000-memory.dmp

        Filesize

        3.1MB

      • memory/4992-141-0x0000000000400000-0x0000000000716000-memory.dmp

        Filesize

        3.1MB

      • memory/4992-1087-0x0000000000400000-0x0000000000716000-memory.dmp

        Filesize

        3.1MB

      • memory/4992-21-0x0000000000400000-0x0000000000716000-memory.dmp

        Filesize

        3.1MB

      • memory/4992-23-0x0000000000400000-0x0000000000716000-memory.dmp

        Filesize

        3.1MB

      • memory/4992-24-0x0000000002910000-0x0000000002911000-memory.dmp

        Filesize

        4KB

      • memory/4992-1103-0x0000000000400000-0x0000000000716000-memory.dmp

        Filesize

        3.1MB