Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2024, 01:23

General

  • Target

    5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe

  • Size

    171KB

  • MD5

    5c760a424e177dbef0c9a7df01c7cd49

  • SHA1

    8d83adf33ff0f1a496a691ecf088529c7e706043

  • SHA256

    3f8ecf8e97a0aaf72edc5b09dcde54171844e8addceb7c3ca12752470d92de18

  • SHA512

    228f38c60272a3b809851c66c1d075f2b10e1d1da4d1c61fc91629e86883528c2f5763f48d6c9a3a36925dd8ef98cfa2624c0ebe5cd66853507050d8a97936f0

  • SSDEEP

    3072:ZIZs1DWIIPV0SbLz+Dcjh9SYvioAQWz5GdIQFZ8HRVFqc4v:ZIqWIIPV0SbP+ojb7qoAfqI3RVFq1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5c760a424e177dbef0c9a7df01c7cd49_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4672
      • C:\Windows\SYSTEM32\schtasks.exe
        schtasks /create /sc minute /mo 1 /tn "Client" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2312
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Hello World!','Hello!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4388
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-et1tswa.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:32
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES12E2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc762AA2FAE51B4B29826D4759A157405A.TMP"
          4⤵
            PID:2832
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lihlvvqh.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4776
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES136F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3776D52DB7BE4D97A135CBE16C6E98C.TMP"
            4⤵
              PID:3240
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\js8ohsvm.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4524
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES13EC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc453900E8E74B46BFB93958E01016CF92.TMP"
              4⤵
                PID:3472
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\p1pqrnuy.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1840
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES14D6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5BEF85316DEB4936A5FCA3C2E7D46A5.TMP"
                4⤵
                  PID:2684
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ebmo0tre.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:5024
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES15D0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1997C63CC5C24733B716FC72512357C6.TMP"
                  4⤵
                    PID:460
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ae8etqmd.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4360
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES169B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6381D653AA0B489EA073605C8923FA84.TMP"
                    4⤵
                      PID:3600
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\p2pmng2o.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1144
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1728.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3CE111FAEBA40C991701E4EA9187B5F.TMP"
                      4⤵
                        PID:2976
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ifduqoqg.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3248
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1786.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDE8F36556464AF59F808EDB91F6E8C.TMP"
                        4⤵
                          PID:3568
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\t5d8njfj.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2568
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES17E3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7F4E7EC0A42D48B0A91B3E3A62D36C1.TMP"
                          4⤵
                            PID:992
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4116,i,11266875042087428226,16669718873272757238,262144 --variations-seed-version --mojo-platform-channel-handle=3440 /prefetch:8
                      1⤵
                        PID:5000
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe"
                        1⤵
                        • Executes dropped EXE
                        PID:5052

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\-et1tswa.0.vb

                        Filesize

                        262B

                        MD5

                        8cf7b621ac99e27fb3c1f7bbed3261b6

                        SHA1

                        b3804e6705058de6a333205e477c675d9195550c

                        SHA256

                        a2909d3da7b6c0e826cac2ff9039969cff03f55af9b8c8d89ad5bfe5ab92a162

                        SHA512

                        60abc537d57ee7d06bb779af3e6000f66cac9e32d20fbe18776f07c17071204aa03e6de5889d6ccb056310fbe56c97fde74fd7cbb927cb9d3632e9d4b1a6d1e2

                      • C:\Users\Admin\AppData\Local\Temp\-et1tswa.cmdline

                        Filesize

                        156B

                        MD5

                        77b64b174dc91bccd07087d12a926ce6

                        SHA1

                        e0b7180c5cb8cb59546247ed366ddf027adca77b

                        SHA256

                        17b0a206c86c909b9061538c5e988b4ee5299f148f48267bb41a7580100c166c

                        SHA512

                        3253959b4733ebfa2ec0bf521eb33b13598f19590cdfe73b09cc3c1334ff255cf5ead2c9b9b37e9bd8fd602a9297823d59ae4d5e6ddc220d0ab6f0f249718ba2

                      • C:\Users\Admin\AppData\Local\Temp\RES12E2.tmp

                        Filesize

                        1KB

                        MD5

                        99a25c65bf8d8a298b9868b443914d08

                        SHA1

                        d4ba3cb4e47641069f18113cfc1028562308e641

                        SHA256

                        3c168454a27286c7d560544adcca24493138a5b0aa1d6281168573920f377e34

                        SHA512

                        564a65591fc9f77f7c39774f287e646dae9c5544b9098468aa6f14aac5aa78e12a70050fb05e8b59cacfa4e21980f5534f35f25ea468e8f54efb8d80c444c7ad

                      • C:\Users\Admin\AppData\Local\Temp\RES136F.tmp

                        Filesize

                        1KB

                        MD5

                        d5ab0ee64e73967750c523974a7c6805

                        SHA1

                        d488976c0e56e6f89178cc9c6a20f4dc9c569193

                        SHA256

                        b50be291721e355c9a45c398ea13ce349918587ad7e41b889b1acec87c5842dd

                        SHA512

                        aef9c6c6245ca0ec0ae3065184bb24ff9d98485182dee2d5faf69ad1060bfe0bbf736d836a948f0617b876a7aa2da3a27d616b2259d176366649effd78c80c50

                      • C:\Users\Admin\AppData\Local\Temp\RES13EC.tmp

                        Filesize

                        1KB

                        MD5

                        9c778be9d93ba48054b0b605d4a3e067

                        SHA1

                        bfc5f6fd89e2cc94c21a195f2c8ed47ac6407561

                        SHA256

                        afebd54e3b5e8180510d82d7779b4c084fd4a7edf928b25be0e66072e801bae6

                        SHA512

                        8ea0444c5d7ab0d2dab1e6ee6c04d4394a20d77afd8a9d98ce28a88eb37c2e66ce2ff6f8812165fcf54af762487e883ec06ee5d0a7e79cf2232542178434dbb4

                      • C:\Users\Admin\AppData\Local\Temp\RES14D6.tmp

                        Filesize

                        1KB

                        MD5

                        9455a6d1c42a9bbece65fc3050f67e03

                        SHA1

                        80c778c3495cd46a7bf199955d1416efbc19cbd5

                        SHA256

                        34144a6c229a61265772441f8ecdfb78b6b0826a5d45197e241f4c9cc017a8ed

                        SHA512

                        a7c326995a7ac5fafd580f2146d831153364050052f24127dbc07b75976498e57a8a5551bd2e45cf7784d4b3bd8ac1d52292068d9919bf314c723ec62176f067

                      • C:\Users\Admin\AppData\Local\Temp\RES15D0.tmp

                        Filesize

                        1KB

                        MD5

                        6b02dcccc2a539f65be66bca41056cce

                        SHA1

                        dce1334801c2b1456c54f80131c5372f7286ea11

                        SHA256

                        1c2ba679aa96cf3021474058f706359ba95cd12c2369f3dc1de108a7c3096273

                        SHA512

                        50c0e685198a04069931428ca4441b0329492e067a649c65b5abeebf10001fc1cd282c33cacc5f3df9d21aaadc752b2a289fbbc2eec518926b4251db7487f80a

                      • C:\Users\Admin\AppData\Local\Temp\RES169B.tmp

                        Filesize

                        1KB

                        MD5

                        cf937be7f42d16fffee58d637969895d

                        SHA1

                        b1c7e264111bb5deeb38e71e3f8abd8da27a9857

                        SHA256

                        80dff06579d025d52f8915fb8f3adfb0282ad4b5857ffc708c98ea182fc71c45

                        SHA512

                        b218f330cd1be1399fc7dfb26393de5d7fd68e4afc2cca2d66d7a2c43a5d01250a7ea4aa9f360995bb4af433f5ce2e38c586f7676f6a673c057cf97435f246d3

                      • C:\Users\Admin\AppData\Local\Temp\RES1728.tmp

                        Filesize

                        1KB

                        MD5

                        c7877cf1cf314b6fb1ddbff81cf6a8cf

                        SHA1

                        bf1b802a6a92e35e7f82a232d90bb4733883c3cd

                        SHA256

                        b7d36e5407c22935a44004313fc3b7ee3410b95d24135cc6b106b9029ad94237

                        SHA512

                        7bfc162c49f9b774071aee5e6f9524f5aae8973899ef0a010bd4568820e7170e4651ba6cfb4b15643e0172b624d3023eb157df3c4a19e502079a58ba1d7e39af

                      • C:\Users\Admin\AppData\Local\Temp\RES1786.tmp

                        Filesize

                        1KB

                        MD5

                        fbafc6c35eb62242fc309e5dafe0d5a8

                        SHA1

                        54bd77b6af69acd3154ee8dfe615aad1ddee2411

                        SHA256

                        9d53cd3a912dfeca0a82c3c1e2ca6fe3299d4fcfeac639004e94e03014e437e7

                        SHA512

                        097e1502122fccc4131a2b1d49c2a473d4c7e0a7ed1a610a556f8b71a470155b21da01a34e8b8eafe96b22c8d717df4769ff6e491175cb221e13d0cb22317b12

                      • C:\Users\Admin\AppData\Local\Temp\RES17E3.tmp

                        Filesize

                        1KB

                        MD5

                        d4506b65260ba9f476a6d50789488d93

                        SHA1

                        b1c850757ddaa69ad7422e923cc7cdba91eb5bbe

                        SHA256

                        7dcf9e59b28f1e6e02864fae4b45d64e7bb4bf7a272f79e37f1e22107fe9affa

                        SHA512

                        a5736c206f99e5dd5574433e34ff8604e2ccc7e1fa20034851c778c0190c99c5123313d247e07e7089d1602606107c60ab5187bbab7eae6f090101b22ad34e91

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_junnyym4.zsb.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\ae8etqmd.0.vb

                        Filesize

                        270B

                        MD5

                        cb0f65d0a016eb9352822a874a57627e

                        SHA1

                        7d59651244eb906eabcc2c84d80d2fcc6a743130

                        SHA256

                        dbf6ed6a93022acb240150687df9d3336215728a51258df92b2e60e5109bc70a

                        SHA512

                        4bdff418a9cd630f745f511b4d88ef9c2ea3ad7014aa7ad5c2f8592d668be595e1043b314114a232b4bd3d08cf1751a5f64a16e24c274f3963b5ae5f2e2fc1ff

                      • C:\Users\Admin\AppData\Local\Temp\ae8etqmd.cmdline

                        Filesize

                        164B

                        MD5

                        6d433fad82fa70b55890c6b54f8af83d

                        SHA1

                        09be878b05d6407cf62080a06afaac94d7f8021e

                        SHA256

                        f7d726eb03cbef4380067ad39bc32928caf34e7e965fc892d41c2df83f9ccad1

                        SHA512

                        23d1de79a42b1a5f6243b90dadbbcef1ddd183c5e94c0c3976a3cc4434e24d4649123373b3b7d262511529e16f3f274e3e363ed88068aec6f44799e054799e48

                      • C:\Users\Admin\AppData\Local\Temp\ebmo0tre.0.vb

                        Filesize

                        280B

                        MD5

                        4d8f1afb3ed9f5a3eeb3b8fb8fce0f45

                        SHA1

                        e4c97e3c43095007cba55e0a733a4c0e50a398ba

                        SHA256

                        a879a45aede6c08a2f756a5f4591e62aa16ca12ae1f8b249978f0246c7c694e5

                        SHA512

                        6b8954659d72d0da98cac2a738ca8de2751400d6d6c2eef68cc04fa383968a7b0c1a078f8ec3fb9c09d2844a2280212f232dd74c517237ccfe628f46350742b8

                      • C:\Users\Admin\AppData\Local\Temp\ebmo0tre.cmdline

                        Filesize

                        174B

                        MD5

                        427c54399f1c79fc61cfab3929d6787a

                        SHA1

                        92a3a3e404acd2ab4a25e011def15bc9035c035a

                        SHA256

                        d7a7c36aee7e07c476d1eafa6c946606ada18c0ea0236a393c77888c50b5e8a7

                        SHA512

                        d76d47a99c40707c14c82160c484f647283dff93f688b89f02932a50d3da878160fd7ebf177f12d59fdd290e48931bbdb3c6f550859bb7026842a672d7441e5c

                      • C:\Users\Admin\AppData\Local\Temp\ifduqoqg.0.vb

                        Filesize

                        277B

                        MD5

                        6667d496e8a18aeacf3c6e2d08a0f1e2

                        SHA1

                        366007276a835b57bb2328ca00181509f98a6d68

                        SHA256

                        d90d11ee50d4ba0d4c4eccde3085e7871a3b553adf2f855d476ccce957290308

                        SHA512

                        8bc9cf9f5819cc874b982daa4c7c5e27c28a2959707cc8b1465e55cdf19063a3f664889d4d1ba626cdbc5f9353b3558dcc1a350e941c655199e62d5b8a9580d2

                      • C:\Users\Admin\AppData\Local\Temp\ifduqoqg.cmdline

                        Filesize

                        171B

                        MD5

                        795f82a27f7c5091c665ddd13fca30a1

                        SHA1

                        b0f94efe749ab654604be063c47be984c210ba92

                        SHA256

                        8f15771e4f62d19ef354ad5a755a43b1f6cd36066443a3caf04e435514a548a2

                        SHA512

                        0027cfe7334162f3cd1a47aa4d0a0545f89011cb9c7bf67ed18c1e4b48dd562ecaa16ed6a44345029601a165332977ff12aae479ac5ff9cea084040028debf42

                      • C:\Users\Admin\AppData\Local\Temp\js8ohsvm.0.vb

                        Filesize

                        277B

                        MD5

                        7dd49fda8abeb2475c6539f017e8b03d

                        SHA1

                        6789eee7ee3f85a2ec697aa6baca93c2d07e851f

                        SHA256

                        1d8825944d3f2468c465c055af5e8f334b2a90a9b686ee07dc7118b638d7dc40

                        SHA512

                        ca05cf2d34b2daa636c8d3a1ba6bd3d8f459b79a2de9b4ccc847cb93a7d1bf03ec5e2d84b3715fe5c91b1865abb1a5d0404c24574083675739d306873bfc824d

                      • C:\Users\Admin\AppData\Local\Temp\js8ohsvm.cmdline

                        Filesize

                        171B

                        MD5

                        53e69ed3420a3fbf860fcba3639763d4

                        SHA1

                        36542664f22eaefff3c8ad980227b15d12f132bd

                        SHA256

                        aa022a317a647c1646372a936f565401af4fb7cb71968a5fc1a80f1beb66194b

                        SHA512

                        333dcbde6875ef9a23497260f81b03dad8b7c8a5f7b95fe1a6cd527d11baa0d2d0686addbf90554abb431e0877b8d83d615092109d6eb60f11fbe76e4eef87b8

                      • C:\Users\Admin\AppData\Local\Temp\lihlvvqh.0.vb

                        Filesize

                        268B

                        MD5

                        222a06289d5bfa9d6f23d5a7cbe9f0c5

                        SHA1

                        ed3dd51aa9c8e284136b2ee9c3bda248380e0b6c

                        SHA256

                        52a04ffd331600f1d08eb476ec608d41bef2cca24ac38684e1f54d2882ebb443

                        SHA512

                        d344f34e45997af876d30c1d87708b1cf43bc15a2a3d0a31706c4b97fb6bf4312bd780e1bbe13ee09f377322b153f6e3be6ff6986d888251410c20e79e47d766

                      • C:\Users\Admin\AppData\Local\Temp\lihlvvqh.cmdline

                        Filesize

                        162B

                        MD5

                        bcda818ddec483e7f959e9efdffee3f8

                        SHA1

                        f793a652fd05dfaf6f9295aa218dfbe24c75ceff

                        SHA256

                        de7413a7c1c5241c574c51400832266e127ea8637a62e420c0e96f24aa727581

                        SHA512

                        9b55219313ffa347e616df009657bf8456556782574a84a771063d80d5c0936847cbd59c245f555739d5ec61a9bc81e68b9e500ee97e63c829df8a0dd2e2bf0d

                      • C:\Users\Admin\AppData\Local\Temp\p1pqrnuy.0.vb

                        Filesize

                        278B

                        MD5

                        5bc92729c7989db3ecc76e5e4c44b10d

                        SHA1

                        dda2cb12d82d7a7ae6d6c2f5c9ab5cd82c87a2e9

                        SHA256

                        76ec533ab24480e64cc90c9caebee926d0a523f283377031bc025bf14bb96dca

                        SHA512

                        0e8d42cd8fec4b00487fafa23a132a7853fa022a33fe26730e00f994cdfd42f2d6df4214ac145ad555b7ea1edabf3344cc9da69f923d7330768ffa22fbb5da26

                      • C:\Users\Admin\AppData\Local\Temp\p1pqrnuy.cmdline

                        Filesize

                        172B

                        MD5

                        36e47e114c3c32c0ba442fd7286fa263

                        SHA1

                        4a45f7c413f6d151fcfe1d0a7ee8bccb38247075

                        SHA256

                        e588856b6961dd1b9589f56adac86776cce74a3120b11363a6b705999c7d54d1

                        SHA512

                        28ab0bcd93540b495d2aead1f4820e2e02f8139d14d2a547fcd6e86507565c34175d91975d4fe7625c5e6a599c355e729b175bb53838d0eaea25486db85dca72

                      • C:\Users\Admin\AppData\Local\Temp\p2pmng2o.0.vb

                        Filesize

                        276B

                        MD5

                        9728d7479fa4932a6ddfb2bbb3fbd476

                        SHA1

                        02485c002a581e859f31c672ccd21da5c956667e

                        SHA256

                        46111c43b6c3cc66a40934059edaad59fc921ec83e4a8f2666ab6c2ee1ea832e

                        SHA512

                        15c3c7d916d15599d3151c031e8fa2fb004e3c53b411e81eacf6fb1e5a74ef073f91e0e46bfaa6e34816e9218b1aa24cd2907d3820cb71542a3ddfb5ac119826

                      • C:\Users\Admin\AppData\Local\Temp\p2pmng2o.cmdline

                        Filesize

                        170B

                        MD5

                        65c9924f19105ff816481f22cf7cfde9

                        SHA1

                        a2cdddf5c4141166a2ff9739257e0c238a1ed73e

                        SHA256

                        0d0031e51a32705942fcc13fa3d140b11d3eced98b8d071edaa263a9df26beeb

                        SHA512

                        691fc8bcde16066789026d89c7c589f36d2524e896b771fe822a5b27f37c14755589d8e4fa45b651347303e5b1a3eed21e55b40c7b5fe987e7171f298b117f2a

                      • C:\Users\Admin\AppData\Local\Temp\t5d8njfj.0.vb

                        Filesize

                        279B

                        MD5

                        33306ccba8def6f472ac5859b2fdee3a

                        SHA1

                        fbba4ad2f45abcd3bb769224e54ca5ef19d7fae1

                        SHA256

                        943614468a973d81e9e6553ebd2613d9a5ccb4140b53923e256f048b4d098b66

                        SHA512

                        2fd8c671d1e0a3466e80b25a4742230fa5c176cf27d60728a6f5265fdc1f6ed3944c6bc1255fb1174d82fe5655e6bf34005535a6b62ddfc938efbea851587d33

                      • C:\Users\Admin\AppData\Local\Temp\t5d8njfj.cmdline

                        Filesize

                        173B

                        MD5

                        7e7472d356766ddffe96989e287f1acd

                        SHA1

                        e8593fc15dcabbb4b42c5f52540c721b43c4e1bc

                        SHA256

                        550edec5855d2d4f41b00406b49feb0984127fb2dd935f0b35f9f9a1d066053d

                        SHA512

                        b5d5bb078d7867c8ed4780280519d1bace17f8204c491907ea2d4d03248d5b7bf05ed9e5da1b743a263e68c1eb1a15bd5392ef9bf50d94e907e8e4190576618d

                      • C:\Users\Admin\AppData\Local\Temp\vbc1997C63CC5C24733B716FC72512357C6.TMP

                        Filesize

                        684B

                        MD5

                        8135713eeb0cf1521c80ad8f3e7aad22

                        SHA1

                        1628969dc6256816b2ab9b1c0163fcff0971c154

                        SHA256

                        e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a

                        SHA512

                        a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4

                      • C:\Users\Admin\AppData\Local\Temp\vbc3776D52DB7BE4D97A135CBE16C6E98C.TMP

                        Filesize

                        668B

                        MD5

                        3906bddee0286f09007add3cffcaa5d5

                        SHA1

                        0e7ec4da19db060ab3c90b19070d39699561aae2

                        SHA256

                        0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                        SHA512

                        0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                      • C:\Users\Admin\AppData\Local\Temp\vbc5BEF85316DEB4936A5FCA3C2E7D46A5.TMP

                        Filesize

                        676B

                        MD5

                        85c61c03055878407f9433e0cc278eb7

                        SHA1

                        15a60f1519aefb81cb63c5993400dd7d31b1202f

                        SHA256

                        f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b

                        SHA512

                        7099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756

                      • C:\Users\Admin\AppData\Local\Temp\vbc762AA2FAE51B4B29826D4759A157405A.TMP

                        Filesize

                        644B

                        MD5

                        dac60af34e6b37e2ce48ac2551aee4e7

                        SHA1

                        968c21d77c1f80b3e962d928c35893dbc8f12c09

                        SHA256

                        2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                        SHA512

                        1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                      • C:\Users\Admin\AppData\Local\Temp\vbc7F4E7EC0A42D48B0A91B3E3A62D36C1.TMP

                        Filesize

                        684B

                        MD5

                        7a707b422baa7ca0bc8883cbe68961e7

                        SHA1

                        addf3158670a318c3e8e6fdd6d560244b9e8860e

                        SHA256

                        453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                        SHA512

                        81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Client.exe

                        Filesize

                        171KB

                        MD5

                        5c760a424e177dbef0c9a7df01c7cd49

                        SHA1

                        8d83adf33ff0f1a496a691ecf088529c7e706043

                        SHA256

                        3f8ecf8e97a0aaf72edc5b09dcde54171844e8addceb7c3ca12752470d92de18

                        SHA512

                        228f38c60272a3b809851c66c1d075f2b10e1d1da4d1c61fc91629e86883528c2f5763f48d6c9a3a36925dd8ef98cfa2624c0ebe5cd66853507050d8a97936f0

                      • memory/2568-5-0x00007FFEA00D0000-0x00007FFEA0A71000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2568-0-0x00007FFEA0385000-0x00007FFEA0386000-memory.dmp

                        Filesize

                        4KB

                      • memory/2568-7-0x00007FFEA0385000-0x00007FFEA0386000-memory.dmp

                        Filesize

                        4KB

                      • memory/2568-6-0x00007FFEA00D0000-0x00007FFEA0A71000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2568-18-0x00007FFEA00D0000-0x00007FFEA0A71000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2568-1-0x00007FFEA00D0000-0x00007FFEA0A71000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2568-3-0x000000001BEB0000-0x000000001BF56000-memory.dmp

                        Filesize

                        664KB

                      • memory/2568-8-0x00007FFEA00D0000-0x00007FFEA0A71000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2568-2-0x000000001B930000-0x000000001BDFE000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/2568-4-0x000000001C080000-0x000000001C0E2000-memory.dmp

                        Filesize

                        392KB

                      • memory/4388-45-0x000001FBF2600000-0x000001FBF2622000-memory.dmp

                        Filesize

                        136KB

                      • memory/4672-19-0x00007FFEA00D0000-0x00007FFEA0A71000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4672-21-0x00007FFEA00D0000-0x00007FFEA0A71000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4672-20-0x00007FFEA00D0000-0x00007FFEA0A71000-memory.dmp

                        Filesize

                        9.6MB