Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15-03-2024 12:12
Behavioral task
behavioral1
Sample
RevengeRAT.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
RevengeRAT.exe
Resource
win10v2004-20231215-en
General
-
Target
RevengeRAT.exe
-
Size
4.0MB
-
MD5
1d9045870dbd31e2e399a4e8ecd9302f
-
SHA1
7857c1ebfd1b37756d106027ed03121d8e7887cf
-
SHA256
9b4826b8876ca2f1378b1dfe47b0c0d6e972bf9f0b3a36e299b26fbc86283885
-
SHA512
9419ed0a1c5e43f48a3534e36be9b2b03738e017c327e13586601381a8342c4c9b09aa9b89f80414d0d458284d2d17f48d27934a6b2d6d49450d045f49c10909
-
SSDEEP
1536:SGZiTHzreu+4SHYEJicHHkxcPiwlJ6BjQaJ7ehgQpmnp3bDBq+AD3tSYxV:Z8AHxicHEuP5l/aJ7ehgiYDk9SYz
Malware Config
Extracted
revengerat
Guest
0.tcp.ngrok.io:19521
RV_MUTEX
Signatures
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
RevengeRat Executable 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe revengerat -
Drops startup file 2 IoCs
Processes:
RegSvcs.exeRegSvcs.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe RegSvcs.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe RegSvcs.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2072 svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
RegSvcs.exepid process 2224 RegSvcs.exe 2224 RegSvcs.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\svchost.exe" RegSvcs.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
RevengeRAT.exeRegSvcs.exesvchost.exeRegSvcs.exedescription pid process target process PID 1740 set thread context of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 2224 set thread context of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2072 set thread context of 452 2072 svchost.exe RegSvcs.exe PID 452 set thread context of 960 452 RegSvcs.exe RegSvcs.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
RegSvcs.exeRegSvcs.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 RegSvcs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegSvcs.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 RegSvcs.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegSvcs.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RevengeRAT.exeRegSvcs.exesvchost.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1740 RevengeRAT.exe Token: SeDebugPrivilege 2224 RegSvcs.exe Token: SeDebugPrivilege 2072 svchost.exe Token: SeDebugPrivilege 452 RegSvcs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
RevengeRAT.exeRegSvcs.exevbc.exevbc.exevbc.exevbc.exevbc.exedescription pid process target process PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 1740 wrote to memory of 2224 1740 RevengeRAT.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 2680 2224 RegSvcs.exe RegSvcs.exe PID 2224 wrote to memory of 300 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 300 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 300 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 300 2224 RegSvcs.exe vbc.exe PID 300 wrote to memory of 836 300 vbc.exe cvtres.exe PID 300 wrote to memory of 836 300 vbc.exe cvtres.exe PID 300 wrote to memory of 836 300 vbc.exe cvtres.exe PID 300 wrote to memory of 836 300 vbc.exe cvtres.exe PID 2224 wrote to memory of 1488 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 1488 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 1488 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 1488 2224 RegSvcs.exe vbc.exe PID 1488 wrote to memory of 2476 1488 vbc.exe cvtres.exe PID 1488 wrote to memory of 2476 1488 vbc.exe cvtres.exe PID 1488 wrote to memory of 2476 1488 vbc.exe cvtres.exe PID 1488 wrote to memory of 2476 1488 vbc.exe cvtres.exe PID 2224 wrote to memory of 2164 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 2164 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 2164 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 2164 2224 RegSvcs.exe vbc.exe PID 2164 wrote to memory of 2032 2164 vbc.exe cvtres.exe PID 2164 wrote to memory of 2032 2164 vbc.exe cvtres.exe PID 2164 wrote to memory of 2032 2164 vbc.exe cvtres.exe PID 2164 wrote to memory of 2032 2164 vbc.exe cvtres.exe PID 2224 wrote to memory of 2644 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 2644 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 2644 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 2644 2224 RegSvcs.exe vbc.exe PID 2644 wrote to memory of 1980 2644 vbc.exe cvtres.exe PID 2644 wrote to memory of 1980 2644 vbc.exe cvtres.exe PID 2644 wrote to memory of 1980 2644 vbc.exe cvtres.exe PID 2644 wrote to memory of 1980 2644 vbc.exe cvtres.exe PID 2224 wrote to memory of 2272 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 2272 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 2272 2224 RegSvcs.exe vbc.exe PID 2224 wrote to memory of 2272 2224 RegSvcs.exe vbc.exe PID 2272 wrote to memory of 588 2272 vbc.exe cvtres.exe PID 2272 wrote to memory of 588 2272 vbc.exe cvtres.exe PID 2272 wrote to memory of 588 2272 vbc.exe cvtres.exe PID 2272 wrote to memory of 588 2272 vbc.exe cvtres.exe PID 2224 wrote to memory of 1428 2224 RegSvcs.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RevengeRAT.exe"C:\Users\Admin\AppData\Local\Temp\RevengeRAT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\b7aornem.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6691.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6690.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qluuogaq.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES66EE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc66ED.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\eva5diij.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES672D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc672C.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nzm6yjuo.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES677B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc676A.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yyagt_ub.cmdline"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES67B9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc67B8.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\pyk0wcug.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES67F8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc67F7.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\pw_opo9s.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6836.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6835.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\igazjp9v.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6874.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6873.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-cy9ro7j.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES68C2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc68C1.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\35drauvl.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES68F1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc68F0.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xgx92kan.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES693F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc692F.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cv5ptw0d.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES697E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc697D.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ml37ujsa.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES69BC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc69BB.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bwelwl23.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES69FA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc69F9.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\c-p6v5if.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6A39.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6A38.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\u5lzjel9.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6A77.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6A76.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uol6po7x.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6AD5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6AD4.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zhs8sycs.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6B13.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6B12.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\keczyqaw.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6B52.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6B51.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xbf09rdi.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6BA0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6B8F.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uzdjxmpi.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6BCE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6BCD.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\aiq_yit2.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C0D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6C0C.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gx3hdyqx.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C4B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6C4A.tmp"4⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hosognuq.cmdline"3⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C99.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6C98.tmp"4⤵
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"4⤵
- Drops startup file
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"5⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"5⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1-gr1k3i.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES18EE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc18ED.tmp"6⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fuubnzcb.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES193C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc193B.tmp"6⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ltujplmm.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES198A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1989.tmp"6⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\5uwfj_1a.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES19C9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc19C8.tmp"6⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xhimtnyq.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1A07.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1A06.tmp"6⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\v_edffge.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1A45.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1A44.tmp"6⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\8r0zum1s.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1AD2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1AD1.tmp"6⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\64radpb-.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B20.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1B1F.tmp"6⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\7swyzans.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B5E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1B4E.tmp"6⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uve6a2v2.cmdline"5⤵
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1B8D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1B8C.tmp"6⤵
-
C:\Windows\system32\taskeng.exetaskeng.exe {878AA067-911D-403C-8D46-FE542190098E} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\svchost\vcredist2010_x64.log-MSI_vc_red.msi.icoFilesize
4KB
MD5c398ae0c9782f218c0068cd155cb676c
SHA17c5bb00a34d55518a401cd3c60c8821ed58eb433
SHA2569806476e9e8d001a2c6e1f0ceef24ec928e8d207c67888485df831e69deec2d3
SHA51285f2b00101e4b3406f1e79033114b5ef4b9c3f6e9a0153da9cd5dff438f73ac90a29df05900061d0467c367e7aaa64a59b966d69530004e3a0517beb8cacbbb8
-
C:\ProgramData\svchost\vcredist2010_x64.log.icoFilesize
4KB
MD5cef770e695edef796b197ce9b5842167
SHA1b0ef9613270fe46cd789134c332b622e1fbf505b
SHA256a14f7534dcd9eac876831c5c1416cee3ab0f9027cf20185c1c9965df91dea063
SHA51295c7392ffcf91eaa02c41c70a577f9f66aff4e6a83e4d0c80dbd3a2725f89f90de7ab6484497bf6e0a0802fd8ced042647b67c5ea4bee09e1b2be30b0db1f12f
-
C:\Users\Admin\AppData\Local\Temp\-cy9ro7j.0.vbFilesize
375B
MD5085f35c737b484465e1799359126ee1c
SHA1f51feaf15af726cb9cbc151cd86b9913e428abcb
SHA256940fb15c66dc34a66b192569ec3588a11285af4f7230c27d54191dcff5dd5b1e
SHA5128314ec82f79a6dbd1e946be25984635c149ef6689e33d8010680f5bdf3bc8803bc14d8dbaa92717fec261d7f27e8f87384478130c3fe5ee37f3ec84fa2bf1402
-
C:\Users\Admin\AppData\Local\Temp\-cy9ro7j.cmdlineFilesize
265B
MD593d11b7249b4e613737946357065981f
SHA17920780af3cb48710256f2b401a36b630855129b
SHA256db71215df322eaf4eff82f064df5266fced35a88d3d3b4cbbc5b817174e67616
SHA5128e1348150bf86aab3fe5c2eb7a914d94da0e88c5f2ca4b43076012d578b007d9fa3a1976d20f7888ddbbd4ffb501b4f215330233bd633179f51f162326827f8a
-
C:\Users\Admin\AppData\Local\Temp\35drauvl.0.vbFilesize
378B
MD5a52a457213a9d0522f73418af956a9ef
SHA1cd46e651cb71f2b3736108d58bd86c7cf3794ecc
SHA256be60d63078e797b8b46dc31f978e20e9819ef09b6fd3d5869934ace0530f23f7
SHA5129d3458eefcd36539d4e97ed847f06faf96e0a8445e1d352d6a77506a042f513fb39523f90eff3aa1ef06afb000371e94d1968bc61d28bfb00f2a8cbbcc2eb3c2
-
C:\Users\Admin\AppData\Local\Temp\35drauvl.cmdlineFilesize
271B
MD5376b3e928ebde0ea0b5e52bba9b56248
SHA18f059bd1c8ac2ac17c5c94a097fe02d007f9af79
SHA256172bef66a81fa3b895574cfae27d79379c0428b3d04c5b37ba494b681a8e7dab
SHA512b7a28e59b651170598722c05db162227a3379b8e1e0a9b6553fc9715b09f5f515f0685f23e35eeb2693306420faf6043443d14abe8ebea6be7272ea302312210
-
C:\Users\Admin\AppData\Local\Temp\RES6691.tmpFilesize
5KB
MD507bba6aff0d15d445a8062995d27a646
SHA1b12b749469428f5c76a6e8118545af5dd0b411b9
SHA25648d64e366f00847e0a8898f2efa3b4944aadaeb24f030ae6ca9c0f4563fdea64
SHA5129060e8402d1ba9dbaa80028abec3fd7f3c92592371a9dfac2ae2c1ed9f05cb142b54c9cded81343de11d987faac5f1ede39dbba020f5e82a79a733f91f39c2b3
-
C:\Users\Admin\AppData\Local\Temp\RES66EE.tmpFilesize
5KB
MD5d717cc3398d39c854fb714aeaf3a8c57
SHA17dfc52974f15bdbec48debca5af4a1bf09a07e1d
SHA256d024b28571b7a5b401a8b29d344f2fd2942d0671ae00ed2234b18bdb32246c0f
SHA512d78ba57670a131429f8d687b7b69747bd4c301ad8d4d4eb7f5f3fc71d545c89ebc23b4bcf8eb3bb6563815eec7be740997f24fc89718aa55d39860616b0dad98
-
C:\Users\Admin\AppData\Local\Temp\RES672D.tmpFilesize
5KB
MD53ea9ecab2876e2a9cdbe2ec59911c40c
SHA1b0a7d5b7d7e62599d268b0623377cf594eab1ec7
SHA256d5541a34bec61a2459846a2eec0625b1ac72ea0e900b604b9f4cd6283e72fc8e
SHA51227be08faf84e6b17567a0660ec06c00affea90c52b6ab31d3368445ed6e55cd0dbc535e0988933b64d6dda02628bf827dd03bbe5cdebee47846dda65f96baf1e
-
C:\Users\Admin\AppData\Local\Temp\RES677B.tmpFilesize
5KB
MD5d94bda0618bc4f4f9ae99cc81f6aa1bd
SHA1a3977770cac72216209797f837a0ddaeb65dc37f
SHA2561c0e32ed069515816c2b18abc67963212c9eb5d77671bc03aee8872e4feae09e
SHA51226e2a27dac872f4e36ae689b54adff85443da6106aca798b4da275d854fa337b7bebc6f08f59b9c0b381d3fb7d3fc34224a1afbf5741e3af7341fb12be9bfe53
-
C:\Users\Admin\AppData\Local\Temp\RES67B9.tmpFilesize
5KB
MD525ab930592d3e151caded63a6c238422
SHA1ad781607ba72ccabbc4b6d604dc2f4149d7da5fd
SHA256e3ca9400fbeaca8bfa3893e769f9410df230b3750afbbd3732035c1219aa1350
SHA5120816d1fb0210b65d774ce1498082e04cadcfca7be8db41d0a6f47028575b5d1dcd28bfbe92fe7053283670bca89d06d728136f5b7db13ec670a1b7ad9f78fe5f
-
C:\Users\Admin\AppData\Local\Temp\RES67F8.tmpFilesize
5KB
MD508f815a14327a484bfb380289ba4f375
SHA196252cb33dac902388fb4a8cc03bbda2eca58237
SHA256b2c22b95a5e20865dd3d39d047e015a7c072feb1da5458a1458130ae7966acfe
SHA51252ea875c15cd4c70f303dbc1852e6c59aab61a1fddb5fd5be91a0799e60bad26d5acf4793666bc00ea02d98c61741ad7727f93b450189bc99bb5de11ca0ac770
-
C:\Users\Admin\AppData\Local\Temp\RES6836.tmpFilesize
5KB
MD573717ef771c4b41d3709a0473bd92968
SHA10b01e6db7529def070ac186946d126c8324cf311
SHA2561472de64351c92f4120ac551cc0f795ce26cbb5ff706e07bf4d5f57919cfd307
SHA5128d574b4e2763a6d4ce9da50e8151c6e666ef6e5e0375737af01d3276c5bebb3a0965bbe48ee3eb537dec448438bbd77079b83042e4c2cd4dd563cd609e56df8e
-
C:\Users\Admin\AppData\Local\Temp\RES6874.tmpFilesize
5KB
MD5b19542185e5cc0c13ad765e52a8173aa
SHA11a0b00f667a9cbfbf74b361653849d8ad8ca418c
SHA256d20ce5dfa9d59a64bbb912a9b41eaf9e259352f129329299aaa1bd77ad4e83dc
SHA512a0d7fa242d484cfb3ce5ed90f026b5fb2301543d6b95d593d02ca7f57d351993745062153c23a3aa45bfa8287d0a9d62a285ae70b708dc145b3300f1b5a7cc74
-
C:\Users\Admin\AppData\Local\Temp\RES68C2.tmpFilesize
5KB
MD5c28f08d017dfc0a2e3306488428c544c
SHA13f49c95b20085a7b91b7e19a7c8e92c25cb8219b
SHA2567cd9ff0376f2289844dd980d081d0bad2cfeabeb73eb547ee80de41b07b725ae
SHA512b658990b1e1045d10096b89583960fedce2724e9843003a8cf567e3a3dabb40a840b3f4aac8eac0c5f4e858ca1d3e5894612ba2806f21ddd555784a03f770869
-
C:\Users\Admin\AppData\Local\Temp\RES68F1.tmpFilesize
5KB
MD552d78e40723bd90b0ccde661fa881ad9
SHA180c2dac358d717a2cdbc9aa050d2979455537804
SHA2562d0f5a3f84aa611e1db8161b1f1d97d0c618d89a5656ee8ec06ee6133dc951ff
SHA512024749ade419c97a277761cbd8512edb3af6bd67485fc68bab679247bb1d7fdcdd829d8370a41ffbf1f0ba19cb0a3bbdbbc9f5772b666adeaebbf809f5516019
-
C:\Users\Admin\AppData\Local\Temp\RES693F.tmpFilesize
5KB
MD58ef21783a28c154ff54f6db252677927
SHA15294626c92c356aab0bed4c48e2885e0935c3e56
SHA256280c164558b8928dbc97a195740fcab3b783cc7afb1059450bcf3c2e70e7f3cd
SHA5122eaea1f01d43709cd92d57024df3e393b9fc2e5ebf35829a828daf09c65e3e934b05f5a7a22ed074aba90b389306c9c25fa96d9c927a110606864a3ac9a2b952
-
C:\Users\Admin\AppData\Local\Temp\RES697E.tmpFilesize
5KB
MD562e2bd0157e0d3a42d0d3af1de6821e7
SHA1d1431ee35fb253e9ab59490490fc39314b585494
SHA256d47f10be075d17c6a11df751bfa03ad02f3bea8f5197c2ad60cf0104d934c3e4
SHA512412e45e6a271046ec47a086ac38d157a9db9be64271c5e90568e35022e7e194c67087c1f061e4a630af3f2ee6bf2852eb57c1afc77b7f031645f93dc5f07e85b
-
C:\Users\Admin\AppData\Local\Temp\b7aornem.0.vbFilesize
369B
MD5e4a08a8771d09ebc9b6f8c2579f79e49
SHA1e9fcba487e1a511f4a3650ab5581911b5e88395d
SHA256ef4c31d167a9ab650ace2442feeec1bf247e7c9813b86fbea973d2642fac1fb6
SHA51248135e0de7b1a95d254ae351ccac0cb39c0d9a46c294507e4bf2b582c780c1b537487161396dd69584c23455950f88512e9931dbff4287c1072938e812a34dd1
-
C:\Users\Admin\AppData\Local\Temp\b7aornem.cmdlineFilesize
253B
MD5125639838252c598547d417d4bc44ab2
SHA13b076064a0766fe9e352d4fa87d100b2750d1376
SHA25684404117630cd69ca27b4a7dd15710a4e52a8ca61ec37e06f30d9108c78b7a83
SHA512be913b8b66cb553fe8b3ee9be48f985a7ce29efb86e1d30d1c6fdf72043dad850670a9ec8fcf0c9a55575c8b85da4b916d2c3b40f2ce7f6ce50fd50d3167d47f
-
C:\Users\Admin\AppData\Local\Temp\cv5ptw0d.0.vbFilesize
378B
MD5b3f4020948b586a0f9b5942315ffdd2e
SHA1bcea9b02c02f4019410a5fc2d6aaa1b8448993e7
SHA25662c128f4f8749a44b0ad3bae5847c107154d0af80562dd4774b92eab801ee16a
SHA512e75ffeab199cdb63a8be4ba2c2607d1616aea9edbb8a4a4632f3d36f13c6e8bbad4dc23992db5f5a6390df143028247bd5a5012394ba47248e084067f9a2ecb8
-
C:\Users\Admin\AppData\Local\Temp\cv5ptw0d.cmdlineFilesize
271B
MD5e2dffe6b8614977e5b408011973aaac1
SHA17b975462467b3a038ee9433132c36b6394ac2b7a
SHA256f427c0fae0daf1a534b8c23514c4abcea6fcc4c2eb1380a0cc5694f63d43ac9d
SHA512cd78c09650f22f8fc05f1fb28566515f86c02d19141bac8b107b7bf5024230eda4ca452c40bbd7542039f95441795253e724a8ebcc0823ce098bfec3c310e7f5
-
C:\Users\Admin\AppData\Local\Temp\eva5diij.0.vbFilesize
369B
MD583f6067bca9ba771f1e1b22f3ad09be3
SHA1f9144948829a08e507b26084b1d1b83acef1baca
SHA256098cd6d0243a78a14ce3b52628b309b3a6ac6176e185baf6173e8083182d2231
SHA512b93883c7018fdd015b2ef2e0f4f15184f2954c522fd818e4d8680c06063e018c6c2c7ae9d738b462268b0a4a0fe3e8418db49942105534361429aa431fb9db19
-
C:\Users\Admin\AppData\Local\Temp\eva5diij.cmdlineFilesize
253B
MD569c7e1fb7f254e31386f4c73c4b38218
SHA18871c86b0eeb87e60ff36710e5e5c9fd912560b1
SHA2561188654af6ef797da451a70531a50350084e0bb5b6447da08e020ba1abfa122b
SHA51263c636b0cef8dfcc7e8d321eb23ec78059d94d23ce4550d64938f7901fde854bab485ae6d40d051858b18267ac19cfa1c86eabc004a6e55f0ee8d544ebb412c2
-
C:\Users\Admin\AppData\Local\Temp\igazjp9v.0.vbFilesize
376B
MD5688ef599a13c30230d9c00287511e084
SHA1496834103ac52660dd8554590a2f92cbda8ab759
SHA2569ce0d8e22177e91d78bf3e578b8b5f0d22d724ae17931195de2e3b5b46255051
SHA5120f244536f83308c7db23337dadcef882fd258954d7e3c8a5f3f66ee0861fec0cd6ea7b3310db65a306de380da410af1e8e4041fabbc917b6af4b94d9424cec8b
-
C:\Users\Admin\AppData\Local\Temp\igazjp9v.cmdlineFilesize
267B
MD585b2568246fce59e112ced7e33694858
SHA158e279b8d4045a7528432ea24270b9a41bf0158d
SHA2566ab1c128e81ecba3f2b765526b2008b4423e84720226df677fad2c4a99f17f00
SHA512bf6cb174a4abe63ac626a27b7aa449b05a7d9618601e5d23fb0a76f619890542f7e6bf7673435f355def641d2af7d3dcf778eec659fc7cf79382ad674b7bd27a
-
C:\Users\Admin\AppData\Local\Temp\ml37ujsa.0.vbFilesize
375B
MD57114e7bf3cad956caa61ac834cbf7a90
SHA19e245814174794c08bcd49d3c1cbbeee528fbdfb
SHA256be2de05d5378b8c7617e9818cf1c992a9148959e0bc3ee18ec98500c7acf3c25
SHA5122a3a229bf576a520634670715921ee021b13a726cde40d13fe17129471c9d44e092df505c11d3c396df2c69c6651be619b92bb14251d7f37275a840a391bcd0a
-
C:\Users\Admin\AppData\Local\Temp\ml37ujsa.cmdlineFilesize
265B
MD54e8154a78cc44b4f20ed89f20de3ffbe
SHA15253183cb5ca3a936386a956f65b13da81d441de
SHA25663b06d0bfcc7283140e1247dab078462e49a69a8dea48f139660d8e7e5810b7e
SHA512bbb08c1121e39b72a65f70d16db6a3e44ff95ba3d880f1bc00cf52f3dafa64fbd14462cd64bda6a9062787882890dc29c92e917a7cc2094cca1ef138e138b70e
-
C:\Users\Admin\AppData\Local\Temp\nzm6yjuo.0.vbFilesize
355B
MD56e4e3d5b787235312c1ab5e76bb0ac1d
SHA18e2a217780d163865e3c02c7e52c10884d54acb6
SHA256aec61d3fe3554246ea43bd9b993617dd6013ad0d1bc93d52ac0a77410996e706
SHA512b2b69516073f374a6554483f5688dcdb5c95888374fb628f11a42902b15794f5fa792cf4794eae3109f79a7454b41b9be78296c034dd881c26437f081b4eaea8
-
C:\Users\Admin\AppData\Local\Temp\nzm6yjuo.cmdlineFilesize
224B
MD52994e6c81a44839c5d897e1bd69e7605
SHA1d6d2b2f64ba03eb20804c9db97d5a24fad0aa0e8
SHA25606abb1f40efa32304c1f68b1af98e2a7f9be489a2e51a04357d5ecfc8b784c9b
SHA51228ec51545244042ba41b5a53ae2f3e7fe8599f195040fb44297de405267cdd3a46db471268f177e49e40dad29559e6a9096bf598e335717e8d61803df441febe
-
C:\Users\Admin\AppData\Local\Temp\pw_opo9s.0.vbFilesize
373B
MD57d0d85a69a8fba72e1185ca194515983
SHA18bd465fb970b785aa87d7edfa11dbff92c1b4af6
SHA2569f78b435099106c2c3486c5db352f7d126b3532c1b4e8fe34ef8931c7b8968d5
SHA512e5ef339dc329dbba2ab06678a9e504aa594d2f21ade45e49bccd83a44a76dc657f5f44dcf368f4d112bb3b01af2e577a487c6078751943770e90780fad202989
-
C:\Users\Admin\AppData\Local\Temp\pw_opo9s.cmdlineFilesize
261B
MD5b66212c85374734c16737e89911e2104
SHA155bc6154e5dff640f4e6d5aeb66c32cff740077e
SHA25670f2b391ab1c5b3d5c14708996c3d383fe835d139f3b623dc0bfb43b1e1f1fc9
SHA512da4ad602579efc4b8689e5562213f37c57c7f8e0b79f524f0aee43ba24d5ffbccd8c4c24765c7c970c519b9154421ac0929100e0917bc03da39e3c0362c87e99
-
C:\Users\Admin\AppData\Local\Temp\pyk0wcug.0.vbFilesize
376B
MD57a8e43324d0d14c80d818be37719450f
SHA1d138761c6b166675a769e5ebfec973435a58b0f4
SHA256733f757dc634e79bdc948df6eff73581f4f69dd38a8f9fafae1a628180bf8909
SHA5127a84dbe0f6eebdc77fd14dd514ed83fb9f4b9a53b2db57d6d07c5ff45c421eac15fdc5e71c3bc9b5b5b7c39341d8e3157a481d9dacefe9faff092478a0cea715
-
C:\Users\Admin\AppData\Local\Temp\pyk0wcug.cmdlineFilesize
267B
MD516fc89e5effa9d9b7ad77eff88fd07fe
SHA159674b2c4e30dde4ce69968354dcd36e623a6af8
SHA256b84fa00761a93f570d4a80b2dc0b156e0c1c92b000cab7622604871491d38e1d
SHA512c82dcafcb5fc8cf7799cd540639c4d3f675a5022e5b40ed441d158fac2f6291c39065bf83d299c5d8be1ca88e565f419f552a6dc3540e4d7818f0284462bffb0
-
C:\Users\Admin\AppData\Local\Temp\qluuogaq.0.vbFilesize
355B
MD5acd609faf5d65b35619397dc8a3bc721
SHA1ba681e91613d275de4b51317a83e19de2dbf1399
SHA2564cfd86d51d0133dda53ba74f67ffe1833b4c0e9aae57afe2405f181fc602f518
SHA512400ffd60ce7201d65e685734cea47a96abca58ca2babda8654b1d25f82d2766ca862a34f46c827249a4dc191d48f56005a9f242765d7becdda1344b8741a9d8c
-
C:\Users\Admin\AppData\Local\Temp\qluuogaq.cmdlineFilesize
224B
MD506560cd4b3c0c68e75bcc80e0b1f90e6
SHA1aaa65963ae211884e284ef91fdb6c67abd33a3f6
SHA256d76cc9487caabfd1d1f98acc20b9301b4c3d0544df9c27ef810f75d2deb6609c
SHA512adda5efc1d6f19b9741941c8d09d3d878b9168af530f3e2adc17072b580ddd9fb578ae7eb6bf0f2c482199a4e4a2268a888f8d8b6dbb3f073ea8b3183012a885
-
C:\Users\Admin\AppData\Local\Temp\uRClgZblR.txtFilesize
48B
MD5927d973950bd5fed1c49b57432117d5f
SHA1197a5267707a8b6503728c11aced2c44a1e952c4
SHA25630e4bfd472dfe004fdbc162f8ed3989a20bb39b7a8aa436b88b69817960efb00
SHA5123504742d0a960dfe9211eb971a2464dd49fe2e140bf32bd375fb5fcb277ee97766cf5c7a2ab31382fc49bce7118ab63f30006b92a23eba18dfe138f3f03f90d0
-
C:\Users\Admin\AppData\Local\Temp\vbc1A06.tmpFilesize
668B
MD53906bddee0286f09007add3cffcaa5d5
SHA10e7ec4da19db060ab3c90b19070d39699561aae2
SHA2560deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00
SHA5120a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0
-
C:\Users\Admin\AppData\Local\Temp\vbc6690.tmpFilesize
5KB
MD5955c29e6642db6b23d9ca8d18903794f
SHA12a12553a01cafeaf83d2f52febb424af00e649bd
SHA2566839c94e5031c8646f5d3db534b41c09076e93cae238d1337aa8a1d41ad741f5
SHA51230eaed32fb99fa62ef8883c4b6e34678175cf8ce24a953d80e43ef67a68f79e9a59996ea3cb4465c6f6d6e0b03a0fab1b241c1d21430bedc49e3e757293fe296
-
C:\Users\Admin\AppData\Local\Temp\vbc66ED.tmpFilesize
5KB
MD5d7d67a3915a3aae053cb2867a77fd9fc
SHA1829757b4c84456ea3771deb6988e77bfc3ad117c
SHA256d1d578383b3b0b42856bef5deb0fc8cd2406e1f9bc8f6818b2c719a66e6d8093
SHA512bb877e96798c34921c613aaa44e424593a791f450a10e254e5a643ec774d527178c7b36bf91cf683e712d893e8e321c8ecafc6a2521f148200f769c9ce2d78be
-
C:\Users\Admin\AppData\Local\Temp\vbc672C.tmpFilesize
5KB
MD5666d582d0f49759982ad0b7cea623a35
SHA154f28f61b9f4ae52dcce4ee9eb8ac0b8d7809ba8
SHA256b890a7bcccc09c2d2577b944bb32e3419d70458e5ecd02f2f846325b86bef862
SHA51229d157e897c2e0547cf105ebee1dca1eabf410ef364fb807055e2dfc79bae4be60ae2d8f012ca02eb37696b335fa0eaffafa1db7a032b80945fcabf954b18d00
-
C:\Users\Admin\AppData\Local\Temp\vbc676A.tmpFilesize
5KB
MD51efc3dabeb7009b6007394dd082dfd86
SHA1a410d235b0cf2733a2ebccc1215dc6d0302a2540
SHA2566185bd2851899871047c82a55a8019a7f3435270e8e93bc06aa3dc757ff55846
SHA51225cf1e8e4a81fc324e1b0324c41f67381ca47760a9cd64b52111286f4ce2b02228db5c5e948586201628ba0a6b8fc73597b216ecfe3b74f072c3ba9c0e7e3bdf
-
C:\Users\Admin\AppData\Local\Temp\vbc67B8.tmpFilesize
5KB
MD5a4da846ea032d0e25d23ca969a569fe4
SHA1facf679f92a929a6fd914bb43f7b52e6536b6802
SHA256329ca0161ca179613635d25604e61a249ba4f1b762f5672bfe27c3bb9a7f47d3
SHA5123255e2339afa13b7e0f1d74572712bcb87ee7366859b3161bf2570b57a9738c1d195a14a7f784849e1ce2233f31b048c393c07f854c0a7a9fb037693d941f8ec
-
C:\Users\Admin\AppData\Local\Temp\vbc67F7.tmpFilesize
5KB
MD5f039d48c1767e0e4303ba43ffe355c97
SHA12e92eb77d16962623212f004480717303db5101e
SHA256e78a94663d6c227a309e24b0952ee7ec52c49fe817a02f29516b36d24d465acb
SHA5124a5e0e693827cbf1a742f71e8b6395382cdfee797ee1e8b0b3fb9e4132e593da9cc532a5cb0b2e9d660d2eefc29f6b0bba849792a6385100348d18cda0950ec3
-
C:\Users\Admin\AppData\Local\Temp\vbc6835.tmpFilesize
5KB
MD5abeeccd127afe60188318600ec0e2795
SHA1adc607f07fc09053d796abf25095c76b361436f2
SHA256d1df4661c37810b6e6d906cad05c9e45c42a080f2b832e56c9e08316a35f6792
SHA5127a6ff2db0e83b9b6d24210fb9a44ea3e0345221f656f46290841bf352edac16dc5a4cb4e8a914ef60c6ca507e6bd5eb1e169ea187feedb7b3050022567dc0ab5
-
C:\Users\Admin\AppData\Local\Temp\vbc6873.tmpFilesize
5KB
MD555e078852806b5d83533794483a09a7b
SHA1ed79aa8f044b59bdef3c7091acab59f92543227c
SHA256be654a24194cd1ffca4dd20466530905c4f208bbfe0f464746d6784bb56e60fe
SHA512632b637781498756bbffa5b267d80ed155f6b89a2842a9691f7cf302ec8ddc1b360d1f4202661b666fd01a1335c6d0ef2f2c69a10c5ff15f086156f2eb031068
-
C:\Users\Admin\AppData\Local\Temp\vbc68C1.tmpFilesize
5KB
MD54a95cbe7406a930bc0b431ccf5ec97a2
SHA11ef8622262c9d6c829affd42877361fec2ac105c
SHA25661d27f9f3053d3366d2ea7234418be37478f0c1773d7d622f2b9c7e0c39f07a3
SHA512b83016a32a253624ee336c74cfd1265f4bd5c95fa7667d776e236783a537215440b4d2a5f7ba6f9421a756ce11b22c3584544d3f9c5d9c4b0a7e12a5fc09da14
-
C:\Users\Admin\AppData\Local\Temp\vbc68F0.tmpFilesize
5KB
MD50b29c6dc82961bb1ba502861a41b0a9f
SHA10491d8095d42138c473b92f400b6138662cdd8ef
SHA2563152b3a5164b8f7ced037e4dce64e877bd6054d4d39caa0547c318ccd25d15f7
SHA5121b4b429c2f60dd47f37bbdb40c19bcddb1b2c0c708b458c11969c89bb5f94db82dab6dad7ccc9c2112c50c0c584de93924a4be242a9738d6ccc36e6dd7ca55fb
-
C:\Users\Admin\AppData\Local\Temp\vbc692F.tmpFilesize
5KB
MD55b433d6e19bfb6046ea8babe98b38fef
SHA1f7c31647ca9efd914a1bd005664f6216fc412c86
SHA25671c163391ea0a47c536db329b28344f6b99f06c45d0d5d9a898b0c024d961cec
SHA512f42496445d976b4d09942f2cd7cf60fa0abac253601a956eef473a0a8e632ad2552926a0c55edf6ca87e3e50e48d0833fe86143158bb413068206ad667fbbfd8
-
C:\Users\Admin\AppData\Local\Temp\vbc697D.tmpFilesize
5KB
MD5556ae762417965d4e6362dac7f6d00d1
SHA1de59a1bd1e1cf8f213975e5fcd03cc1a74e25750
SHA25692c67382383e236fcac528c6389533787a5d85f08cb4919f403e057773371d72
SHA512c3b9590200285371334617feafd9aecf0b374fae08237fc31ce5e03655ad371af2c944b888f3f317906b246d81bc11561c48c5f5c3c7f487a6f503bfd286018b
-
C:\Users\Admin\AppData\Local\Temp\xgx92kan.0.vbFilesize
375B
MD561580d8eee92263741c70b5e756b3a1d
SHA1cb09d0e8635efa1fee911b9ead83c6a298139f27
SHA2561430de0fb4d00afcb7d7df9abd3d248df27101eed793251c8bccaa325a9b6f77
SHA512b0aa8925e8016324ebad6a4307ea4c9b9a58ff564b718092080f966ac069eba387157da708303ce83b7b42b3ffe16efc4dba874e7b4563693195d6736de96d60
-
C:\Users\Admin\AppData\Local\Temp\xgx92kan.cmdlineFilesize
265B
MD5ed65d1d63890541c597801fd83499bd2
SHA16aa7fda04a2b93360f5a667665744d1c08ecc99e
SHA256f009934a77d1f82f50f6725bd68b800035a41721918269abc12b160665a3a70f
SHA512425cad6d9f3ff968dea798848be097207c896afdc42422ea81d8a45262e34d5bbf4c9b31c0e1e11c36ea3c78d778b3a81a9d197f30119fd9d5d71cbe39c07439
-
C:\Users\Admin\AppData\Local\Temp\yyagt_ub.0.vbFilesize
373B
MD5197e7c770644a06b96c5d42ef659a965
SHA1d02ffdfa2e12beff7c2c135a205bbe8164f8f4bc
SHA256786a6fe1496a869b84e9d314cd9ca00d68a1b6b217553eff1e94c93aa6bc3552
SHA5127848cdc1d0ec0ca3ec35e341954c5ca1a01e32e92f800409e894fd2141a9304a963ada6a1095a27cc8d05417cd9c9f8c97aed3e97b64819db5dd35898acac3b7
-
C:\Users\Admin\AppData\Local\Temp\yyagt_ub.cmdlineFilesize
261B
MD5fe0c8a7db09dff55720fd98b31135e7d
SHA1c46237f51eb86202970658ba3d01be83cba3d32f
SHA256f8878d60cb63d5db71206d516f5384a589fe91dd841637ec1617b283f622be4c
SHA512986c6058847d7dc3163b6869f10ec7fcf9e45f0520a519e9bfefb0306abf1850a5c80abb3fd6efc0bac6772e908eaf8bbf18032efe10e9fabbac79bfebc7517d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exeFilesize
4.0MB
MD51d9045870dbd31e2e399a4e8ecd9302f
SHA17857c1ebfd1b37756d106027ed03121d8e7887cf
SHA2569b4826b8876ca2f1378b1dfe47b0c0d6e972bf9f0b3a36e299b26fbc86283885
SHA5129419ed0a1c5e43f48a3534e36be9b2b03738e017c327e13586601381a8342c4c9b09aa9b89f80414d0d458284d2d17f48d27934a6b2d6d49450d045f49c10909
-
memory/452-388-0x00000000740C0000-0x000000007466B000-memory.dmpFilesize
5.7MB
-
memory/452-389-0x0000000000390000-0x00000000003D0000-memory.dmpFilesize
256KB
-
memory/452-374-0x00000000740C0000-0x000000007466B000-memory.dmpFilesize
5.7MB
-
memory/452-372-0x0000000000390000-0x00000000003D0000-memory.dmpFilesize
256KB
-
memory/452-370-0x00000000740C0000-0x000000007466B000-memory.dmpFilesize
5.7MB
-
memory/960-386-0x00000000740C0000-0x000000007466B000-memory.dmpFilesize
5.7MB
-
memory/1568-298-0x0000000002120000-0x0000000002160000-memory.dmpFilesize
256KB
-
memory/1740-6-0x000007FEF4AF0000-0x000007FEF548D000-memory.dmpFilesize
9.6MB
-
memory/1740-4-0x0000000001FE0000-0x0000000002060000-memory.dmpFilesize
512KB
-
memory/1740-2-0x000007FEF4AF0000-0x000007FEF548D000-memory.dmpFilesize
9.6MB
-
memory/1740-13-0x000007FEF4AF0000-0x000007FEF548D000-memory.dmpFilesize
9.6MB
-
memory/2008-330-0x0000000002020000-0x0000000002060000-memory.dmpFilesize
256KB
-
memory/2008-387-0x0000000002020000-0x0000000002060000-memory.dmpFilesize
256KB
-
memory/2008-488-0x0000000002350000-0x0000000002390000-memory.dmpFilesize
256KB
-
memory/2072-351-0x0000000001F20000-0x0000000001FA0000-memory.dmpFilesize
512KB
-
memory/2072-350-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmpFilesize
9.6MB
-
memory/2072-357-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmpFilesize
9.6MB
-
memory/2072-363-0x000007FEF5490000-0x000007FEF5E2D000-memory.dmpFilesize
9.6MB
-
memory/2224-8-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2224-18-0x0000000002010000-0x0000000002050000-memory.dmpFilesize
256KB
-
memory/2224-362-0x0000000074140000-0x00000000746EB000-memory.dmpFilesize
5.7MB
-
memory/2224-14-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2224-1-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2224-5-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2224-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2224-16-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2224-11-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2224-38-0x0000000074140000-0x00000000746EB000-memory.dmpFilesize
5.7MB
-
memory/2224-17-0x0000000074140000-0x00000000746EB000-memory.dmpFilesize
5.7MB
-
memory/2224-19-0x0000000074140000-0x00000000746EB000-memory.dmpFilesize
5.7MB
-
memory/2224-39-0x0000000002010000-0x0000000002050000-memory.dmpFilesize
256KB
-
memory/2240-213-0x0000000002080000-0x00000000020C0000-memory.dmpFilesize
256KB
-
memory/2352-406-0x00000000005C0000-0x0000000000600000-memory.dmpFilesize
256KB
-
memory/2516-317-0x0000000002090000-0x00000000020D0000-memory.dmpFilesize
256KB
-
memory/2580-395-0x00000000020C0000-0x0000000002100000-memory.dmpFilesize
256KB
-
memory/2680-22-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2680-26-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2680-24-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2680-36-0x0000000074140000-0x00000000746EB000-memory.dmpFilesize
5.7MB
-
memory/2680-37-0x0000000074140000-0x00000000746EB000-memory.dmpFilesize
5.7MB
-
memory/2680-33-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2680-35-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2680-30-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2680-20-0x0000000000400000-0x000000000040C000-memory.dmpFilesize
48KB
-
memory/2680-40-0x0000000074140000-0x00000000746EB000-memory.dmpFilesize
5.7MB
-
memory/2708-480-0x0000000001FE0000-0x0000000002020000-memory.dmpFilesize
256KB