Malware Analysis Report

2025-01-22 14:52

Sample ID 241213-bhjpcsvqcr
Target fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd
SHA256 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd
Tags
orcus discovery rat spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd

Threat Level: Known bad

The file fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd was found to be: Known bad.

Malicious Activity Summary

orcus discovery rat spyware stealer

Orcurs Rat Executable

Orcus

Orcus family

Orcus main payload

Orcurs Rat Executable

Executes dropped EXE

Checks computer location settings

Drops desktop.ini file(s)

Drops file in System32 directory

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Modifies registry class

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-13 01:08

Signatures

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Orcus family

orcus

Orcus main payload

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-13 01:08

Reported

2024-12-13 01:11

Platform

win7-20241010-en

Max time kernel

119s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe"

Signatures

Orcus

rat spyware stealer orcus

Orcus family

orcus

Orcus main payload

Description Indicator Process Target
N/A N/A N/A N/A

Orcurs Rat Executable

Description Indicator Process Target
N/A N/A N/A N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsInput.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsInput.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\WindowsInput.exe.config C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File created C:\Windows\SysWOW64\WindowsInput.InstallState C:\Windows\SysWOW64\WindowsInput.exe N/A
File created C:\Windows\SysWOW64\WindowsInput.exe C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Windows Academy\quard.ai C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File opened for modification C:\Program Files\Windows Academy\quard.ai C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File created C:\Program Files\Windows Academy\quard.ai.config C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A
N/A N/A C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1504 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
PID 1504 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
PID 1504 wrote to memory of 1036 N/A C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe
PID 1036 wrote to memory of 2628 N/A C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
PID 1036 wrote to memory of 2628 N/A C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
PID 1036 wrote to memory of 2628 N/A C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
PID 1504 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe C:\Windows\SysWOW64\WindowsInput.exe
PID 1504 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe C:\Windows\SysWOW64\WindowsInput.exe
PID 1504 wrote to memory of 2944 N/A C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe C:\Windows\SysWOW64\WindowsInput.exe
PID 1504 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe C:\Windows\system32\rundll32.exe
PID 1504 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe C:\Windows\system32\rundll32.exe
PID 1504 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe C:\Windows\system32\rundll32.exe
PID 2752 wrote to memory of 2580 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 2752 wrote to memory of 2580 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 2752 wrote to memory of 2580 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
PID 2752 wrote to memory of 2580 N/A C:\Windows\system32\rundll32.exe C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

Processes

C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe

"C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe"

C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe

"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\385j69xi.cmdline"

C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe

C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA7E4.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCA7E3.tmp"

C:\Windows\SysWOW64\WindowsInput.exe

"C:\Windows\SysWOW64\WindowsInput.exe" --install

C:\Windows\SysWOW64\WindowsInput.exe

"C:\Windows\SysWOW64\WindowsInput.exe"

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Program Files\Windows Academy\quard.ai

C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe

"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Program Files\Windows Academy\quard.ai"

Network

N/A

Files

memory/1504-0-0x000007FEF513E000-0x000007FEF513F000-memory.dmp

memory/1504-2-0x0000000000530000-0x000000000053E000-memory.dmp

memory/1504-1-0x000000001AED0000-0x000000001AF2C000-memory.dmp

memory/1504-6-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

memory/1504-8-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

\??\c:\Users\Admin\AppData\Local\Temp\385j69xi.cmdline

MD5 2e58a533d6312c43272e7293d47c2689
SHA1 9b2c7ab77171c1f0ac8ba5a11be9fe023a6833fd
SHA256 9fc7da0f817f04392e19aafe037cb9279c2ac39377885c06cf503827d68e58a7
SHA512 0addf9c973ed6708fd4c66263c7ce1c8c18bb340220ef07630c5e338f661ebfea21a04d714dcd56b5b6aefc3eada209d701f171a3f1701f716b620ed26e68aaf

\??\c:\Users\Admin\AppData\Local\Temp\385j69xi.0.cs

MD5 c555d9796194c1d9a1310a05a2264e08
SHA1 82641fc4938680519c3b2e925e05e1001cbd71d7
SHA256 ccbb8fd27ab2f27fbbd871793886ff52ff1fbd9117c98b8d190c1a96b67e498a
SHA512 0b85ca22878998c7697c589739905b218f9b264a32c8f99a9f9dd73d0687a5de46cc7e851697ee16424baf94d301e411648aa2d061ac149a6d2e06b085e07090

memory/1036-10-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

\??\c:\Users\Admin\AppData\Local\Temp\CSCA7E3.tmp

MD5 09a8b94c2a3d6093af37df5d31801ce1
SHA1 f05901c4932e979a3353b17f23df1e50e88f59ef
SHA256 284aa7fa6cd9f7e68e39d611d6c1dd72e4669507778980ccf181fce244b55e7d
SHA512 9d9060142dc2047ae36cf0b5619f56c06eabc9027dfb04f17d57944189028872f3b8dbb854ea9a115edb5688d6c7bbfebd74dace699cd917706f5bec82d72e77

C:\Users\Admin\AppData\Local\Temp\RESA7E4.tmp

MD5 8d2ecbdbb315d16fda4ca842795b41bc
SHA1 ba69c8c2bd2b0622578051bf06f1eee7b3d229bb
SHA256 ba1c02bd097ff060af0d8f00c2c2c2958a77462d851bf334eeb8eaf5dc7c02f4
SHA512 edd9e46eb01ac13de567a01b156c384cd7c8e7effd16f5b8db84dc50745bbc561e3cb2a3d4bffe73a8455403bec8849f619d3b4cf6c18cf01f3ee223b6c2cf25

memory/1504-19-0x0000000002060000-0x0000000002076000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\385j69xi.dll

MD5 314fb31a53cf3155072eaa5f556855d1
SHA1 1078e8afcb689c8149746dc17a777f9f38643899
SHA256 4e893180f5d80406f70c5e9ff8030efd3222add9c4f11efdd61bb540e73b96a8
SHA512 53130ed8dcc9613af892348e4ad21f25174bb3bff479ab17a7076e348db5fe93447cb148851fc9e8a3a550ac41f9f46d8edc52f9f13eb11c11c8fff57a695f99

memory/1036-17-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

memory/1504-21-0x0000000000540000-0x0000000000552000-memory.dmp

memory/1504-23-0x0000000002220000-0x0000000002228000-memory.dmp

memory/1504-22-0x00000000006F0000-0x00000000006F8000-memory.dmp

memory/1504-24-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.exe

MD5 e6fcf516d8ed8d0d4427f86e08d0d435
SHA1 c7691731583ab7890086635cb7f3e4c22ca5e409
SHA256 8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512 c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

memory/1504-32-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.exe.config

MD5 a2b76cea3a59fa9af5ea21ff68139c98
SHA1 35d76475e6a54c168f536e30206578babff58274
SHA256 f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512 b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

memory/2944-34-0x0000000001040000-0x000000000104C000-memory.dmp

memory/1504-40-0x000007FEF4E80000-0x000007FEF581D000-memory.dmp

C:\Program Files\Windows Academy\quard.ai

MD5 8031ba7c7db878cb3ddd3bf3f9bea80b
SHA1 58bff6171067acc0b51c5c61c04de60b036bbb5c
SHA256 fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd
SHA512 581fa0775baca47a48c4b14f186d085ea8c8f37e52faa516b4bcf5bd4958b3fbde0df8dcd5ed65163a928e58ef1c4ac2938d476920be7fd8e72d90f494658d11

C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

MD5 22602bb8bef44a1e91c89246f5778f27
SHA1 d4be97b3887a5c5ac04232ba4051d5a7712e9b28
SHA256 5c1bfbc42f42c745fe4df6f90ece84c33dc959d097e15729f571111b95b4a445
SHA512 f2c45818e6bdfa4efe55c222a5b380afa034d9311d2600c58d6c0f0aacd62bf105b333dfc9230524f93edd603426049d150d6795fe97e50986fef95d8cde6846

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-13 01:08

Reported

2024-12-13 01:11

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsInput.exe N/A
N/A N/A C:\Windows\SysWOW64\WindowsInput.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\WindowsInput.exe C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File created C:\Windows\SysWOW64\WindowsInput.exe.config C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File created C:\Windows\SysWOW64\WindowsInput.InstallState C:\Windows\SysWOW64\WindowsInput.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files\Windows Academy\quard.ai C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File opened for modification C:\Program Files\Windows Academy\quard.ai C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File created C:\Program Files\Windows Academy\quard.ai.config C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\assembly C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File created C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A
File opened for modification C:\Windows\assembly\Desktop.ini C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe

"C:\Users\Admin\AppData\Local\Temp\fe27a5091ee443a0f1b5082d2bff21654a75ff029d5ebdaaa80b108d265725cd.exe"

C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe

"C:\Windows\Microsoft.NET\Framework64\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ta53kmuz.cmdline"

C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe

C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAA99.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCAA98.tmp"

C:\Windows\SysWOW64\WindowsInput.exe

"C:\Windows\SysWOW64\WindowsInput.exe" --install

C:\Windows\SysWOW64\WindowsInput.exe

"C:\Windows\SysWOW64\WindowsInput.exe"

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 134.130.81.91.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 53.210.109.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 22.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 18.24.18.2.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp

Files

memory/3896-0-0x00007FFAE3015000-0x00007FFAE3016000-memory.dmp

memory/3896-1-0x00007FFAE2D60000-0x00007FFAE3701000-memory.dmp

memory/3896-2-0x000000001B470000-0x000000001B4CC000-memory.dmp

memory/3896-3-0x00007FFAE2D60000-0x00007FFAE3701000-memory.dmp

memory/3896-6-0x000000001B660000-0x000000001B66E000-memory.dmp

memory/3896-7-0x000000001BC10000-0x000000001C0DE000-memory.dmp

memory/3896-8-0x000000001C0E0000-0x000000001C17C000-memory.dmp

\??\c:\Users\Admin\AppData\Local\Temp\ta53kmuz.cmdline

MD5 3e68a0ea9f69a0ec777a3d14dabb2e7c
SHA1 6d2f4f1d559c569903fa23d5b32bff15237e63bb
SHA256 dd8e7fe8331ff751194dbd47effa1cec24e25c86f590896dcc1531d8d3fa32e3
SHA512 05f4f0433daf5ccaf61e8dca65851023700549df5a62520010b2a8eac5655bce7170466cd958c6414f446a5d3cbe82cac38ac6416bc5383bf603a814619e853d

\??\c:\Users\Admin\AppData\Local\Temp\ta53kmuz.0.cs

MD5 623a887a29ef5982cc8306cdaa2af122
SHA1 c21227c8cf36134d47e36bd06e141170f70e3ad3
SHA256 ca32c2fcf0ef199b64143069ae63e9a88cf800eefaef72837670d9f64872178e
SHA512 2899605d40c47a3c4f0d2f7b3efb97b5ab4855e5a34d90642f4ac46169d477de40fe649123adee1bd33d2a773d1db42914cf0e7ec6add9c85da3a7043e6cd85a

memory/2552-16-0x00007FFAE2D60000-0x00007FFAE3701000-memory.dmp

\??\c:\Users\Admin\AppData\Local\Temp\CSCAA98.tmp

MD5 108d6361cd8f0acf85a43ac5d8d9d087
SHA1 a47b1d0abac07297e00f1b4e2e39fe3a3f2714fe
SHA256 e1ea1e0aaa536c3e6aeb7ed74032dd8db5c0827cf479d5ff85a4c846084f8011
SHA512 45de26df90c376ab43ac06c57e21aa64acc4c9656143a6fdc5759d29accc5477095d23a53ecbeaa72bbb6e6ed595526850a4b2916d8a751ef02b007b3591049c

C:\Users\Admin\AppData\Local\Temp\RESAA99.tmp

MD5 dad72e0cf5615d3c0256c846c54d0147
SHA1 f937dcdfab5c0c17c74649e22bbcad555769c79a
SHA256 536e3ab5a3e7513e6e4bbc77893c77f7e52e0335cdf0e395ff2430ba25ce5ad8
SHA512 c2774f7daac10dc03ba751e129befa1ed713c7630932d143983808cdca305a6534e554d83726ccb16afc92bcfaa93954e23dbb8cf89f773d06dd75638262d13a

memory/2552-21-0x00007FFAE2D60000-0x00007FFAE3701000-memory.dmp

memory/3896-23-0x000000001C780000-0x000000001C796000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\ta53kmuz.dll

MD5 f41b6ed8496a336ddc6d84d9eca352de
SHA1 3e2f7ab184958724048b30130b21e68a8bc6d995
SHA256 f433493e2265aa2b3d240540a5eac37078c588173674fbfb9ec74932a014f621
SHA512 366e595419b4927ae113f3d56b707479c6fc5c94a1f1129ecdc8aa52b715045157bb8efc2218d0f3c84eabdf62b71c2c9213d51fd5cd6370cdd5f16f43a48554

memory/3896-25-0x000000001B3D0000-0x000000001B3E2000-memory.dmp

memory/3896-26-0x0000000000E70000-0x0000000000E78000-memory.dmp

memory/3896-27-0x000000001B460000-0x000000001B468000-memory.dmp

memory/3896-28-0x000000001CB70000-0x000000001CBD2000-memory.dmp

memory/3896-29-0x000000001D4D0000-0x000000001DA8A000-memory.dmp

memory/3896-30-0x000000001DA90000-0x000000001DB80000-memory.dmp

memory/3896-31-0x000000001CCD0000-0x000000001CCEE000-memory.dmp

memory/3896-32-0x000000001DB90000-0x000000001DBD9000-memory.dmp

memory/3896-33-0x00007FFAE2D60000-0x00007FFAE3701000-memory.dmp

memory/3896-34-0x000000001DC70000-0x000000001DCE0000-memory.dmp

memory/3896-35-0x00007FFAE2D60000-0x00007FFAE3701000-memory.dmp

memory/3896-37-0x000000001DF40000-0x000000001DF60000-memory.dmp

C:\Windows\SysWOW64\WindowsInput.exe

MD5 e6fcf516d8ed8d0d4427f86e08d0d435
SHA1 c7691731583ab7890086635cb7f3e4c22ca5e409
SHA256 8dbe814359391ed6b0b5b182039008cf1d00964da9fbc4747f46242a95c24337
SHA512 c496cf8e2e222fe1e19051b291e6860f31aae39f54369c1c5e8c9758c4b56e8af904e3e536e743a0a6fdbbf8478afba4baee92e13fc1b3073376ac6bf4a7948e

C:\Windows\SysWOW64\WindowsInput.exe.config

MD5 a2b76cea3a59fa9af5ea21ff68139c98
SHA1 35d76475e6a54c168f536e30206578babff58274
SHA256 f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512 b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad

memory/2848-51-0x00007FFADF813000-0x00007FFADF815000-memory.dmp

memory/2848-52-0x0000000000790000-0x000000000079C000-memory.dmp

memory/2848-53-0x0000000002930000-0x0000000002942000-memory.dmp

memory/2848-54-0x000000001B380000-0x000000001B3BC000-memory.dmp

memory/4804-59-0x000000001A2C0000-0x000000001A3CA000-memory.dmp

memory/3896-64-0x00007FFAE2D60000-0x00007FFAE3701000-memory.dmp