Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-05-2024 16:34

General

  • Target

    4c073cd92c5a4c3b6bd40fb55423ad0b_JaffaCakes118.exe

  • Size

    1.9MB

  • MD5

    4c073cd92c5a4c3b6bd40fb55423ad0b

  • SHA1

    a3b16db9197db98e2a3344feff379efdb74dbbfe

  • SHA256

    0242ec15a75e7567186f9b6936caee53a9a7c24d5b3302d541d44790ac716693

  • SHA512

    2c6a63206fb44ba2a9445284427dd154a6682769c17765f4843d33362a168028f7870b793b6beea8a45d4330209284da425e36c025f49a396dda130aa8ff9590

  • SSDEEP

    24576:NedrDOQzXK0st3/7UxN/jm90TtfM8I7P7gM9gcQ4PcHg/BG12+A9pNj5zb:NeJn6T/7Uzu0T9M77zg22aG12x/j5P

Malware Config

Extracted

Family

orcus

C2

127.0.0.1:10134

Mutex

1169c1ec32264ab791bcec659a351540

Attributes
  • autostart_method

    Disable

  • enable_keylogger

    true

  • install_path

    %programfiles%\Orcus\Orcus.exe

  • reconnect_delay

    10000

  • registry_keyname

    Orcus

  • taskscheduler_taskname

    Orcus

  • watchdog_path

    AppData\OrcusWatchdog.exe

Signatures

  • Orcus

    Orcus is a Remote Access Trojan that is being sold on underground forums.

  • Orcurs Rat Executable 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c073cd92c5a4c3b6bd40fb55423ad0b_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4c073cd92c5a4c3b6bd40fb55423ad0b_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
      2⤵
        PID:2068
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
        2⤵
          PID:2484
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
          2⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2524
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\bkanhnlz.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBC7D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCBC6C.tmp"
              4⤵
                PID:2408
          • C:\Users\Admin\AppData\Local\Temp\sewinup.exe
            C:\Users\Admin\AppData\Local\Temp\sewinup.exe
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1660
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1960
              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ibblyrha.cmdline"
                4⤵
                • Suspicious use of WriteProcessMemory
                PID:1508
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1585.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1584.tmp"
                  5⤵
                    PID:2656
              • C:\Users\Admin\AppData\Local\Temp\sewinup.exe
                C:\Users\Admin\AppData\Local\Temp\sewinup.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:2176
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                  4⤵
                    PID:1752
                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                    4⤵
                      PID:2132
                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                      4⤵
                        PID:1676
                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                        4⤵
                          PID:2652
                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                          4⤵
                            PID:840
                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                            4⤵
                              PID:1388
                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                              4⤵
                                PID:2476
                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tq1pk7ds.cmdline"
                                  5⤵
                                    PID:2568
                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB980.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB97F.tmp"
                                      6⤵
                                        PID:2208
                                  • C:\Users\Admin\AppData\Local\Temp\sewinup.exe
                                    C:\Users\Admin\AppData\Local\Temp\sewinup.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetThreadContext
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2972
                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                                      5⤵
                                        PID:1448
                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\7o_sxzvc.cmdline"
                                          6⤵
                                            PID:1780
                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                              C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES166F.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC166E.tmp"
                                              7⤵
                                                PID:1944
                                          • C:\Users\Admin\AppData\Local\Temp\sewinup.exe
                                            C:\Users\Admin\AppData\Local\Temp\sewinup.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetThreadContext
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2788
                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                                              6⤵
                                                PID:2040
                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\rqisvyaz.cmdline"
                                                  7⤵
                                                    PID:312
                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES739B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC739A.tmp"
                                                      8⤵
                                                        PID:2976
                                                  • C:\Users\Admin\AppData\Local\Temp\sewinup.exe
                                                    C:\Users\Admin\AppData\Local\Temp\sewinup.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2148
                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\regasm.exe"
                                                      7⤵
                                                        PID:2884

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Users\Admin\AppData\Local\Temp\7o_sxzvc.dll

                                            Filesize

                                            76KB

                                            MD5

                                            c49f017186fc884e9305493b3851dda0

                                            SHA1

                                            a03f3493ea9b696e2345220646391425c62cc9d3

                                            SHA256

                                            c0814a2c8ad6fcd4eaaa701c8a7a9b783cbb2e6836c43bf6cbcfcf3cc7c75eba

                                            SHA512

                                            18217b07f2364c25a95b9d25c6fd40f5e01ca285a9df34bcc25df24f93b268261500d9d5019d982923f1af1f13700fe34d6b6f43287d636233b9d19bf7f77b5f

                                          • C:\Users\Admin\AppData\Local\Temp\RES1585.tmp

                                            Filesize

                                            1KB

                                            MD5

                                            1378117e4a7d7fcd56e51555baff7425

                                            SHA1

                                            626e1436d1500ead2a3ff6ff7a93f72102424ba9

                                            SHA256

                                            583e9621dfb02cc0c84d25140ba0fd5568389bdfbcbc5fd4dab36bf8a46c8181

                                            SHA512

                                            e8f6d20d5a256f112403855a4e892d27f6d42dbb8673ffd82b11bbb8f27ce5e79517a8b1dcf3d32614a223581cf01048c96bd6f0c459caa9efa557366d89e1ea

                                          • C:\Users\Admin\AppData\Local\Temp\RES166F.tmp

                                            Filesize

                                            1KB

                                            MD5

                                            b6ba927ad997f846359a784096976f85

                                            SHA1

                                            649fc4e5f7ac881255d0d258276c0a8f65073fc5

                                            SHA256

                                            e4eebb74c047bfd25fdc0b01f4fb55c17beed572da9893a142e9d63d0516d32f

                                            SHA512

                                            87aad519e8a34d69a7c8643b1ad89e3e15c9fd02bc64ff9e865c4488483ed21578cc5a8152dd7859d8fd90c969ac6be1f619887040c089020a8503eaa5da9cf4

                                          • C:\Users\Admin\AppData\Local\Temp\RES739B.tmp

                                            Filesize

                                            1KB

                                            MD5

                                            02055bfa87a9b3acc2b19a69a428aa54

                                            SHA1

                                            bf3368cd05cb210095c08439956c25eac2fda3e8

                                            SHA256

                                            161e56c97f4fd3fc156c9fae9d9e6c4af500f0db2945320606f166185ae69cbb

                                            SHA512

                                            36f77ba444545ac6f6990ed5253aed61ca21e024c0872360e25bb22a7d28952af3f55a8ea3e831b6a6531e2c7286f2fecb60855af2efda655dd85a2cb0593006

                                          • C:\Users\Admin\AppData\Local\Temp\RESB980.tmp

                                            Filesize

                                            1KB

                                            MD5

                                            cc96f075d29baa032edc462766d9ff63

                                            SHA1

                                            95017e9067a3301b5dd02982ede154029e4d554b

                                            SHA256

                                            8e03387a685b535d03c75657e74cab93f18af4e8e622ef7f4cc301dcf4c00ebf

                                            SHA512

                                            ba13fe329183fba1bc9da84465271512387fc47fee25af54ce3c3c4def6a1eb79b684149e34902b6e9a88e361e8a2361afdf24c8e3242a094040e94e47b91e70

                                          • C:\Users\Admin\AppData\Local\Temp\RESBC7D.tmp

                                            Filesize

                                            1KB

                                            MD5

                                            e227c9c64d8c8eba1e5537c76f52d63f

                                            SHA1

                                            355554166a68b8a9086e94cfda707c18f54cb370

                                            SHA256

                                            18e9f51502bf3305b8b41c57ee6a30856cf9afc5675924f00bfa152bd814e4f7

                                            SHA512

                                            d605c446ba05bc67e179eb033b743df06a3ca0edfcddc216fdd7510ca99a40a1b7092afe1af5d071236b6c31fd419076e298caba6bb8780810f1eb3a838e16a3

                                          • C:\Users\Admin\AppData\Local\Temp\bkanhnlz.dll

                                            Filesize

                                            76KB

                                            MD5

                                            cb61a1f8dea083a66270f5fa6709e8c5

                                            SHA1

                                            61c996fd4f5001457d172bf76914e6dd7f3532ce

                                            SHA256

                                            903ff4869e6d5ce8c54c2e359dab4901106d3382bcfcb58194b151666a31fc90

                                            SHA512

                                            768d182d146007181d088c73062e0f59ac77a8c4709a7e4d5294349e704176e73d1a28d66dde13776e5cc860d768369c543eea456c42a2971e4572a420ef55e1

                                          • C:\Users\Admin\AppData\Local\Temp\ibblyrha.dll

                                            Filesize

                                            76KB

                                            MD5

                                            d018935c4d0eadd015384b14d964f0b9

                                            SHA1

                                            1941ee64799b97fbdd9c5643760e5098f6caa526

                                            SHA256

                                            3e8bfcdb7dd39117880ec0c2612b67817ba6bde52a6732b93507145516c8025c

                                            SHA512

                                            b00729c38a5aba9b571153551703c9111848a44d42eaa8c24e7a4ce516582ce66225f885628ee9bbd7094414bc55dc41d527d288a4eca73f02b775ed5356eb42

                                          • C:\Users\Admin\AppData\Local\Temp\rqisvyaz.dll

                                            Filesize

                                            76KB

                                            MD5

                                            ed9d87a98e2ec0963eef45e65ebe29c2

                                            SHA1

                                            18555ec6cc709c2726584228142f2b9483003b99

                                            SHA256

                                            0f3facd0a276bc0491ce213c4b7c31008b136b611c203c88f3216442d93c7558

                                            SHA512

                                            e1288cae7d1cff941816803f406c22b3a0eb230a9f012cf588168d429818af91c6608f6c174e06036af1f8d2defdd70f1f74d0a95d64aa08fac2babd9cdae964

                                          • C:\Users\Admin\AppData\Local\Temp\tq1pk7ds.dll

                                            Filesize

                                            76KB

                                            MD5

                                            55e3a9b54ea69ee9aa6c341476dd0f9f

                                            SHA1

                                            af570af51559fb249a7bdba18d8f4ddb63caabd4

                                            SHA256

                                            12bd02fc055309cc8f347346e44b0e63885ff4c98e8a4db3922c6ab1a685d9df

                                            SHA512

                                            c533f3f4cbaf499f611663b721e2c52ba40f61b78b39ecc47540171c8f959bdde7cf88a50de167845a99b0a366a1f183b3264bc042ca36e5fc3a3b125f4285b0

                                          • \??\c:\Users\Admin\AppData\Local\Temp\7o_sxzvc.0.cs

                                            Filesize

                                            208KB

                                            MD5

                                            8a568706d51109d8a85fae443a76eded

                                            SHA1

                                            845c6ba048e3ca80215d36049dd42b9219b32362

                                            SHA256

                                            aad3f0520d8f3c566d587bc333fc998eba56991063e3312fb34eb4023962b3ad

                                            SHA512

                                            b8753d0ea8d1ad20c6dd578e04e57ce4f3b715144a97fcc66bc8ee6315c6a72c4ccb838e3260a5bd7f0f94e08d43f1be6023a8c92dc62cad38d2980acedb335d

                                          • \??\c:\Users\Admin\AppData\Local\Temp\7o_sxzvc.cmdline

                                            Filesize

                                            347B

                                            MD5

                                            49d9178e57cd9c68d0c6d046cff9f3be

                                            SHA1

                                            4a9e93546f0e4ec99233adef62f2ac4ba29c4ae9

                                            SHA256

                                            830d5f19d238653f7e7df3fcbd2aaa912036ee7bf5a4a80d70d9dd31a4d8cc59

                                            SHA512

                                            24f34f87c5a510539b7dfa71183bffe5e6f33153abcdda8e32457787472befc158c86ec02dbf2b4ac1c93e86b2ad9644cdb1e2fdfca8b62baad4fbc756ac6b0e

                                          • \??\c:\Users\Admin\AppData\Local\Temp\CSC1584.tmp

                                            Filesize

                                            676B

                                            MD5

                                            05a41b2a59fdb07bfd6965583fc076b3

                                            SHA1

                                            abac487afc33e6d016a6b3d0307c97333d8e577c

                                            SHA256

                                            2b5e599538e4ce0ec94cebe00faba86324bb2789f936ca362fd6609915cf0e0c

                                            SHA512

                                            9b7481e61fd784b893eb345b06a64967f5beba8e851a36b0fe050606f1daad4a2f4be8329f28cc04916332737f4578c0e9a06498f227f4ba26375c66484edb8a

                                          • \??\c:\Users\Admin\AppData\Local\Temp\CSC166E.tmp

                                            Filesize

                                            676B

                                            MD5

                                            ceaceb4a1e46767d82e97e5532e1cc8a

                                            SHA1

                                            d5e4314906ca20b8b0dc2077bf0dfd80bf2ea8ff

                                            SHA256

                                            55ca615ad6a704dbe928d532deffede5746ba5d5a8b53292ccac7fdf0db02572

                                            SHA512

                                            04153117334a4c1326cbcb57c963d8435971206d7bed33fed125edfe019bc61573c68e465342ff97186d7ca286e71c6df11f8bea58f3caf07a5f00334aacc619

                                          • \??\c:\Users\Admin\AppData\Local\Temp\CSC739A.tmp

                                            Filesize

                                            676B

                                            MD5

                                            4b4aa60d1ca33cb827739f866a8259fa

                                            SHA1

                                            50e5f239bd665438654d49198d477cb07b63e12e

                                            SHA256

                                            4b53331875bd4b6b9bb19f6ad2b92028611f233f0ad56c650bce751f70f68b1b

                                            SHA512

                                            f835bec19fcc444625af103a2c7d71de7a021cdd2b51ca1eb1d972d38cbbcc4403aeea5f5225d609cfa25f7d0dc3512ed2de867f03ccb39582619c6e73f02ca1

                                          • \??\c:\Users\Admin\AppData\Local\Temp\CSCB97F.tmp

                                            Filesize

                                            676B

                                            MD5

                                            cd3c360cd8ebc6c00dea7cee94a3c135

                                            SHA1

                                            9d77170b094c841ad2ae5b9fcc274853411cfb57

                                            SHA256

                                            8b6044508b30a890f56b252fdf54edb608eead9e463cde036e82320de213f98b

                                            SHA512

                                            79f04147ebc76390aa84822f59855450f24a3a1f05bc421b74eba768fd4712a0491bbcd2b055b21acc2ad588bc93e38a8b43dc701d9c046a41b9b7af87cf8066

                                          • \??\c:\Users\Admin\AppData\Local\Temp\CSCBC6C.tmp

                                            Filesize

                                            676B

                                            MD5

                                            e45fa9b227e7131b2b3170f591eb897a

                                            SHA1

                                            dfe244b4c1d5ba0ea5ea05eb3d61589a07ad2024

                                            SHA256

                                            5a8267384caffb20679a5f26f875b4dd76ea98d58a5f342f6fb3f4c0f262b0ac

                                            SHA512

                                            fb62c0db40c34d24b85bafbae142ea21510a4fb5b5cdc803c1d6d51efcbdc4ee7433cf02cb073752d3289c7fba9b212989aa0db9accc3b566309952a49c0dd02

                                          • \??\c:\Users\Admin\AppData\Local\Temp\bkanhnlz.0.cs

                                            Filesize

                                            208KB

                                            MD5

                                            0bb9155d7657753992e8a35dc0996669

                                            SHA1

                                            64406df34858015e6dac0e037419200f6ff6449d

                                            SHA256

                                            a9af99365663f69cf79453b3130d728f738175f21133d714090a3ae7675375a3

                                            SHA512

                                            345af673eea295d35a2b45b059ffe4420f941a57a5fb7b42c8f590ffcb4efb726388db2d71adbfd6ffd2815d2aad3f7a99b3cd4147e5e0e929a5a47604ef875c

                                          • \??\c:\Users\Admin\AppData\Local\Temp\bkanhnlz.cmdline

                                            Filesize

                                            347B

                                            MD5

                                            900d026df94d36437e4b83afe6fd9d77

                                            SHA1

                                            8e35e85d031c70424874fa331e14a819f8e00d63

                                            SHA256

                                            76980eb09d8b227e7cea941f314effe6b07aa01cdc7410db4c2ae1e32e4178f1

                                            SHA512

                                            95841707f1175244d7adff402f6f594ae0edba18ab0f2e324ae7ef24152e52df5bcf00402836f1f86eef321037ec4c27c694520fad5a669ba6faa753c8c22e20

                                          • \??\c:\Users\Admin\AppData\Local\Temp\ibblyrha.0.cs

                                            Filesize

                                            208KB

                                            MD5

                                            9cc990c14f1f2a931683fdeca589c04b

                                            SHA1

                                            ea6ade8d38168c1db0848fdb8833dc0c048dbffd

                                            SHA256

                                            b786bd11502ee8ff911045ccdffe3c6281c8c22ea760f0463264bb8ea8b6ca86

                                            SHA512

                                            fbb3d93aa9a049c8042f3ed35ecbdba75da84245285f1a07622a7e0fff4b8ee0f45b0ecc8d136cdd2bec9a687394867e80c9ae49abd35ede638bbfa9bc9b6415

                                          • \??\c:\Users\Admin\AppData\Local\Temp\ibblyrha.cmdline

                                            Filesize

                                            347B

                                            MD5

                                            aaba4bf8775179d8262c5fe7945f691e

                                            SHA1

                                            35b9c4206d282198321d44f10ff34e4d55b7cb2d

                                            SHA256

                                            52ce5ec506ecc018cc8bbc94cb0e536e6e71e1f53f4504aeb6c4c603b647887f

                                            SHA512

                                            f4524fa7b4e125774a39aff10df0ab0a755f3cf294e853076d8ca348b2b945479d155722f360eeed101bb1216c2d6ad66c343d3eeec03ad608f021fb7cc6cc7c

                                          • \??\c:\Users\Admin\AppData\Local\Temp\rqisvyaz.0.cs

                                            Filesize

                                            208KB

                                            MD5

                                            8f6350147548e95b67e14d586b7602f9

                                            SHA1

                                            c9ee6405ab9748a991a40c71bb8435c5da89871f

                                            SHA256

                                            bc9d0b71f8ce97f41be195eff3b68c67c832623eca6b0dcfc5ee2b07d7265053

                                            SHA512

                                            d482ff33603d7856cc57ee5abb083d618c1836f36498ccdb2afbb01245a66d0618a70f7de63550dfa51c45b0175491ddd882d293537ae67566fc0ca01bade18d

                                          • \??\c:\Users\Admin\AppData\Local\Temp\rqisvyaz.cmdline

                                            Filesize

                                            347B

                                            MD5

                                            b09536a0ba4e220fe57504de0c52e866

                                            SHA1

                                            4ba1bf6e5b35894620be043a39301e47779cd779

                                            SHA256

                                            1c6671aebd5633948588d077acea6707f69a2d8750c2d2c3909b7d6566b95160

                                            SHA512

                                            388427cde51707d7454550781ed471d752415dbae001457050fc16f3c7e7da2a9bd1dc80ebd0a3bf3896737cf3d7b62f6946ed40160e3bd89311cabb6e935786

                                          • \??\c:\Users\Admin\AppData\Local\Temp\tq1pk7ds.0.cs

                                            Filesize

                                            208KB

                                            MD5

                                            ffb8a20b8ad213206608cb8005cdacc2

                                            SHA1

                                            dd37f1f1e019d92692c84a897cbda552188d45b2

                                            SHA256

                                            f5f11238b5b39e1f89ba8d4401de8416c0c8361fff4dc5c1aaa7689f6a32b67a

                                            SHA512

                                            bebe880e4ec8f1db51770ccc2bbf19080d7e2d9fe1b28ce2d3941bee93e501c65a1270833265ccfada33b383b9cc21a8425039cc061ad7494c218768e32b047c

                                          • \??\c:\Users\Admin\AppData\Local\Temp\tq1pk7ds.cmdline

                                            Filesize

                                            347B

                                            MD5

                                            92e28dda1e4fff9d0cb12f8e8389c177

                                            SHA1

                                            cc97785977b4a6e8b78fca985b79150e40b5b447

                                            SHA256

                                            46fa1a5c7d28a134cd47df3b59526eda287ff91eda8b86fa98f19e8a968b64b2

                                            SHA512

                                            e64513ec7102a10e4eda29e42f16b10f817ff6729623ac28449e71a2c0d7e18588d9977816d97d40212de04b3704ba814af2dbeabe3ac06cf084af900ed5326f

                                          • \Users\Admin\AppData\Local\Temp\sewinup.exe

                                            Filesize

                                            1.9MB

                                            MD5

                                            4c073cd92c5a4c3b6bd40fb55423ad0b

                                            SHA1

                                            a3b16db9197db98e2a3344feff379efdb74dbbfe

                                            SHA256

                                            0242ec15a75e7567186f9b6936caee53a9a7c24d5b3302d541d44790ac716693

                                            SHA512

                                            2c6a63206fb44ba2a9445284427dd154a6682769c17765f4843d33362a168028f7870b793b6beea8a45d4330209284da425e36c025f49a396dda130aa8ff9590

                                          • memory/1660-60-0x0000000000400000-0x00000000004E7000-memory.dmp

                                            Filesize

                                            924KB

                                          • memory/2176-68-0x0000000000400000-0x00000000004E7000-memory.dmp

                                            Filesize

                                            924KB

                                          • memory/2500-23-0x0000000074650000-0x0000000074BFB000-memory.dmp

                                            Filesize

                                            5.7MB

                                          • memory/2500-16-0x0000000074650000-0x0000000074BFB000-memory.dmp

                                            Filesize

                                            5.7MB

                                          • memory/2524-4-0x0000000000400000-0x00000000004E8000-memory.dmp

                                            Filesize

                                            928KB

                                          • memory/2524-7-0x0000000000400000-0x00000000004E8000-memory.dmp

                                            Filesize

                                            928KB

                                          • memory/2524-10-0x0000000074652000-0x0000000074654000-memory.dmp

                                            Filesize

                                            8KB

                                          • memory/2524-8-0x0000000000400000-0x00000000004E8000-memory.dmp

                                            Filesize

                                            928KB

                                          • memory/2612-26-0x0000000000220000-0x0000000000221000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2612-28-0x0000000002DE0000-0x0000000002ED5000-memory.dmp

                                            Filesize

                                            980KB

                                          • memory/2612-29-0x0000000003A20000-0x0000000003B15000-memory.dmp

                                            Filesize

                                            980KB

                                          • memory/2612-39-0x0000000003A20000-0x0000000003B15000-memory.dmp

                                            Filesize

                                            980KB

                                          • memory/2612-0-0x0000000000220000-0x0000000000221000-memory.dmp

                                            Filesize

                                            4KB

                                          • memory/2612-9-0x0000000000400000-0x00000000004E7000-memory.dmp

                                            Filesize

                                            924KB

                                          • memory/2612-2-0x0000000003A20000-0x0000000003B15000-memory.dmp

                                            Filesize

                                            980KB

                                          • memory/2612-1-0x0000000002DE0000-0x0000000002ED5000-memory.dmp

                                            Filesize

                                            980KB

                                          • memory/2788-134-0x0000000000400000-0x00000000004E7000-memory.dmp

                                            Filesize

                                            924KB

                                          • memory/2972-110-0x0000000000400000-0x00000000004E7000-memory.dmp

                                            Filesize

                                            924KB