Resubmissions

03-07-2024 16:04

240703-thygmaycpc 10

01-07-2024 18:12

240701-ws6xvswbkj 10

01-07-2024 18:03

240701-wm5sls1gka 10

01-07-2024 18:03

240701-wm39sa1gjf 10

01-07-2024 18:03

240701-wm2e7avhkj 10

01-07-2024 18:03

240701-wmzxcs1fre 10

01-07-2024 18:02

240701-wmzats1frc 10

01-07-2024 18:02

240701-wmvbwa1fqh 10

22-11-2023 17:02

231122-vkac9adg64 10

Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 18:03

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Extracted

Family

revengerat

Botnet

XDSDDD

C2

84.91.119.105:333

Mutex

RV_MUTEX-wtZlNApdygPh

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 4 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2832
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xk1ej0jq.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2784
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES69CC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc69BB.tmp"
          4⤵
            PID:2952
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\s7_bqeyh.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6A77.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6A76.tmp"
            4⤵
              PID:1228
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zsp9yn8c.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1704
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6AE4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6AE3.tmp"
              4⤵
                PID:1248
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\m_i0wolv.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:3020
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6B71.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6B70.tmp"
                4⤵
                  PID:476
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tatdnjd0.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:768
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6BDE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6BDD.tmp"
                  4⤵
                    PID:1108
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rlx-ih4u.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2004
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6C8A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6C89.tmp"
                    4⤵
                      PID:1180
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-uq30fp8.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2384
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6D64.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6D63.tmp"
                      4⤵
                        PID:1532
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rv-30hbs.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1592
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6E10.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6E0F.tmp"
                        4⤵
                          PID:2028
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\q277mt5l.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:564
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6E8C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6E8B.tmp"
                          4⤵
                            PID:760
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-84ntcrm.cmdline"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:940
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6EDA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6ED9.tmp"
                            4⤵
                              PID:1952

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\-84ntcrm.0.vb

                        Filesize

                        273B

                        MD5

                        3c3d3136aa9f1b87290839a1d26ad07a

                        SHA1

                        005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                        SHA256

                        5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                        SHA512

                        fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                      • C:\Users\Admin\AppData\Local\Temp\-84ntcrm.cmdline

                        Filesize

                        173B

                        MD5

                        e12fa158fec344f5e9377b06ae22827a

                        SHA1

                        7a3d5bc05ba19b839006e31689208f9da77c99c1

                        SHA256

                        c3bb4e40f8cdff248126e7f81d200be7b58219c5bdbdbf0493edaf88e7795dc5

                        SHA512

                        def20f533931b4800c46b87f4ae5c2ce92546a5c8d6afaf49149d4480a8682a0bae5a22ef68102c21fe71b8cd1e955b17aa3b4527729466a012e3823c28f7ee4

                      • C:\Users\Admin\AppData\Local\Temp\-uq30fp8.0.vb

                        Filesize

                        271B

                        MD5

                        b19384e98248a2c238e2360d2fecf049

                        SHA1

                        25f5ab6303d0a81f4ef3cc44c0bb53dd3e564fad

                        SHA256

                        296feb4019e37af5174b813d3ac19fa1b17c4db9ad91b06eba610939983e3262

                        SHA512

                        e9e4dd4a302d643fd1d0dd46d058ca7a45c8e6d8b299c129e1a412d1d3309cfe4d4da6f9d893460dde7e96c40414d65e02dbab9c1411dd945581e749ae8438e4

                      • C:\Users\Admin\AppData\Local\Temp\-uq30fp8.cmdline

                        Filesize

                        171B

                        MD5

                        8395e6beb8ad4b8935c45b5bfca192c1

                        SHA1

                        b9da3c11dea035205b259780f39cc4549e894b94

                        SHA256

                        201ec20fb546b9dddae3d3b41112d52e4c572d5c01741c69696bc354a85320f2

                        SHA512

                        893c4bedef4884061e8d60a5ba4bf9353ab6ada6eddf61e080d37191282949047392c576e3d60e2034bcb0841482c6bd3f400b78985af8bfb4e06d0c3aacd86b

                      • C:\Users\Admin\AppData\Local\Temp\RES69CC.tmp

                        Filesize

                        1KB

                        MD5

                        e0c7448a39f29a190e67d5330efd73ec

                        SHA1

                        21fc6b426d1963f0a7722f6bd2c8f765661c1f60

                        SHA256

                        67746be49103ff13d793a4e07ef175eee85a505b381f738616f0cd9991e54d5b

                        SHA512

                        6f359900682dbd4c67bab34818ba989605b2ed267e5eba779d310e408f8c8735624e3e928ab366ba90a5cab87b56339e0fa69e5ab8b14db3572a89f9df665852

                      • C:\Users\Admin\AppData\Local\Temp\RES6A77.tmp

                        Filesize

                        1KB

                        MD5

                        ffeb9d92f15ff23134c42cce71d154b8

                        SHA1

                        a2067a55c14ed06e3ae2ef06813168cf6ac4c58a

                        SHA256

                        e6045f02153635bd21d99422fa29b7f3437aaf0c5a0542bea1112e49a967d367

                        SHA512

                        0fe18ea6eb76ba18a8d84cd61c000211a1e9d612a0c42fa753d13d20c5791be79022e364b46c9328001ee2d167f266174422e7fc1704c7eedeedf0bd8d02119e

                      • C:\Users\Admin\AppData\Local\Temp\RES6AE4.tmp

                        Filesize

                        1KB

                        MD5

                        31045b0db8bb4632f550dbb72963c77d

                        SHA1

                        00439214a1eb11ce6d8720e5075701a0529f2104

                        SHA256

                        e15a3974b9d58203517738c7bc9d29c44badf17f5214bcc02fb60f2783db4f62

                        SHA512

                        161ff3d9f8b0d7b0f04bc6b3111df2e360471d0fc77dac990324d12404e34fbbe933d3860d3a0a0d5fd9e9f061336ca0380e1924e50d3a80629967ee2768402f

                      • C:\Users\Admin\AppData\Local\Temp\RES6B71.tmp

                        Filesize

                        1KB

                        MD5

                        3f611c2110144b58848490f4af4ae59e

                        SHA1

                        822a6ee3a6c403b23cdbe17646569e084fbf0ceb

                        SHA256

                        a3b05e19ead2f204406e1eea89b25a2a81de43d0a51ea155f3b7b6c1f3efbed4

                        SHA512

                        a99ae3d87dd44a44fb20cdb66b56b3d73aa23c0959785f24cf5e9f455e998b89c7b1e51d87c4fdd8f492ca006ae6cfab9854d6989f15927e4172671423d8196a

                      • C:\Users\Admin\AppData\Local\Temp\RES6BDE.tmp

                        Filesize

                        1KB

                        MD5

                        f86c29fdb299896877303da21106f966

                        SHA1

                        670752a5362342cd44ca81b487444242d0c3d171

                        SHA256

                        a47ec95feb7bcd01b074d96d6c48284472d22f2ffa6b2b7b711316115ffac1d8

                        SHA512

                        882f8fd26f3cfee30d85f791638f9cd158817d5e2d847a3c7c5a19197c724a274c3f116106d76011eb35bacaacc5345704955fa8195ee0ffe676607079a83920

                      • C:\Users\Admin\AppData\Local\Temp\RES6C8A.tmp

                        Filesize

                        1KB

                        MD5

                        d23c2cb55c03e7d5bd2f37e4b91577f1

                        SHA1

                        fcb104da1f6f083628b42cb6d3221a1b20859da4

                        SHA256

                        86b0486ae450ddb29d898a6e43c0d688af02637d6f76f2a16b3f7d75034b4deb

                        SHA512

                        3d16045e5e89f6424cbf985236db48984dbd39bc06d59abf471795adeae2dd87a1b80c8f2264521c07a3a73b010c91aa09af313e46ba8ba4df885b064957ce90

                      • C:\Users\Admin\AppData\Local\Temp\RES6D64.tmp

                        Filesize

                        1KB

                        MD5

                        a57f12fd1b6da13e3635e1212d7bc8ef

                        SHA1

                        bbb06eab2d70bfd38ad093846476cb7c47795212

                        SHA256

                        00d28fc03d85086c3174b1114825276cf12c4110ea2445b39c6226aaca07a9ef

                        SHA512

                        68bd1e0f7204a0039d4c1a81b782da1969304086ca0f5c644e37a348c857f433893b40d73af7edd10ced380a2eb8a02128b6796ac9fefcc2fb3406e6f012b343

                      • C:\Users\Admin\AppData\Local\Temp\RES6E10.tmp

                        Filesize

                        1KB

                        MD5

                        97b6044b6e7ff25e0163347694738f5c

                        SHA1

                        5f9e3cd29de9a4562305ef17dc0c99a97daa6f87

                        SHA256

                        02858c476885655b3a5c2c02b20f6c1445347d8601604ae0c6f707d956a8f929

                        SHA512

                        b8cbc51ece2a80507e1e4fcb4886c7f8b826f8192a25f95ce32bd5a28538fe4907923011523259301a26f476b42eb106c5c3fd33c8432110711054fa6c543226

                      • C:\Users\Admin\AppData\Local\Temp\RES6E8C.tmp

                        Filesize

                        1KB

                        MD5

                        b052c53166aa9c4fd7fb11799b294fce

                        SHA1

                        1528e29c49c0e4b68e5413643b7cb85f20613e08

                        SHA256

                        86069b71f2c83f041ba062b6bc9e375711d269f69998902bbf7a4e900990149d

                        SHA512

                        06383f5add108c660f80d848e6d12b9a21bc583c652187bbd14f9fffa99ed6da653ebac0d7b541d7a0a5a13b1719f7d8ca6efe27646b2a9a3198086c65fa488e

                      • C:\Users\Admin\AppData\Local\Temp\RES6EDA.tmp

                        Filesize

                        1KB

                        MD5

                        c4269b01e74a8f8c6373eb95b556bc32

                        SHA1

                        1ed2f287a74744e9cec43b02dca38777fa025c56

                        SHA256

                        14cb7d01425303c0e780e39278f7d67081ae9fdd2ca7f60bd19a453f651e53d0

                        SHA512

                        d6f10c29e09003536c0c9a716ee6ae43b5809b6cb80d0cb954854283902dc0dcae52ad799295f42125f3b89bce31d7d74a85b2c0b2d2267a2967d1fffb4053e4

                      • C:\Users\Admin\AppData\Local\Temp\m_i0wolv.0.vb

                        Filesize

                        269B

                        MD5

                        d8ec3923c7b4bf7ae4ba2dd32ba5174f

                        SHA1

                        bd232f852b5428b0360c9708604793deb513c36e

                        SHA256

                        316f5f33d99324745cbdad4dfe3ece93321e270a177f3646d78d72d1f7a1d648

                        SHA512

                        062694e7951b534e5c93d4d2e65c65cc59b9be7f3f1e469b1679d61e03f1770246222009461c6e2a8ddfe41fa367ed6ebd83f53e0a1c3f24db5e97932558ce11

                      • C:\Users\Admin\AppData\Local\Temp\m_i0wolv.cmdline

                        Filesize

                        169B

                        MD5

                        743447a11e7505409ac121baa1aa45db

                        SHA1

                        15c4ce5b9e27996535e6c0d7f367b926a65c5ee8

                        SHA256

                        c9bd5defdfa8da527caaf87cf9d5d4f951611db4cbfd4fa399c80c6d9f75c97f

                        SHA512

                        83817ef0e0ad478202bf55666fdcdb082b49ea13202bb05826cba02bf9088f6378046d6d4a4c724118b5312a2498fa80813d22efc358a922e87e102b64d36cb6

                      • C:\Users\Admin\AppData\Local\Temp\q277mt5l.0.vb

                        Filesize

                        270B

                        MD5

                        658573fde2bebc77c740da7ddaa4634b

                        SHA1

                        073da76c50b4033fcfdfb37ba6176afd77b0ea55

                        SHA256

                        c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                        SHA512

                        f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                      • C:\Users\Admin\AppData\Local\Temp\q277mt5l.cmdline

                        Filesize

                        170B

                        MD5

                        c619bc1ee128bc92477cab16688a4ae4

                        SHA1

                        5fa694ae9d4c34bd2fdd44c6a74515edb45672ff

                        SHA256

                        768277b39445f5f93744ea72fd24ef0d1a5c43b77aec762d94a2e15990ba54b1

                        SHA512

                        6a8c5d49b21f92bd5f23c9ba3758216633a6de1b4b50d531f1281968451c4ab802b71ad6d2308d27871420e3baa28de10b01cd9fb650472d7fde04265130898a

                      • C:\Users\Admin\AppData\Local\Temp\rlx-ih4u.0.vb

                        Filesize

                        290B

                        MD5

                        ce1182df38f7b4c7a89d1e4d1886b0d8

                        SHA1

                        ba5cdc6e13b761912d14ec042639566eebc23eca

                        SHA256

                        e87616f590de6878e0a1051e52bb968d39bad4c7b086cdaecc064c6aa9582e3a

                        SHA512

                        7be8358cbcefde4b1e1a28480eaea0daf5bbbd25aba3d1bd8c589bad3adb63a90551830efabc6e0d2b01a406e41e44c5797502abc88566694fbff7c2091e05a0

                      • C:\Users\Admin\AppData\Local\Temp\rlx-ih4u.cmdline

                        Filesize

                        190B

                        MD5

                        69c3f99b8031ac26ffa6731c3bd146b7

                        SHA1

                        d5c3cf66f9439cf93346aeaff5e71bca0177d974

                        SHA256

                        577c24528919f8720cf7a0365d8ba775a9bd621738c54384f67d7543b7a828e0

                        SHA512

                        e82774bddaff9034a845dde4e3de998faa42bd431476c480f101083c5a53202370f8e8a131bad975ab432f847d851e3c984271a604eb6ffb432dca489f4f7030

                      • C:\Users\Admin\AppData\Local\Temp\rv-30hbs.0.vb

                        Filesize

                        264B

                        MD5

                        5ce3977a153152978fa71f8aa96909e9

                        SHA1

                        52af143c553c92afc257f0e0d556908eaa8919cb

                        SHA256

                        e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                        SHA512

                        eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                      • C:\Users\Admin\AppData\Local\Temp\rv-30hbs.cmdline

                        Filesize

                        164B

                        MD5

                        83462625054615e3b7f772ec644c75b3

                        SHA1

                        1c6405560ac7823bbc70bfb5cccbd6e114f9cc01

                        SHA256

                        1589cefb5164ad146c1d30b38d47274995a11da6da07c04e571ca38355c4771f

                        SHA512

                        30a6f184f3244a502041fa2a2abcfba53b7785d94413f921c2004cd09d0729825697a8bc9db350b1db0014d5877e17a6a6442eaf1df3140a6a269ca002b993fe

                      • C:\Users\Admin\AppData\Local\Temp\s7_bqeyh.0.vb

                        Filesize

                        266B

                        MD5

                        debab8fb1bbcbf74ca2ac313d4d5aa7d

                        SHA1

                        2a4058378b3df8ef9aa547d1511a425ef043d848

                        SHA256

                        0f1d45b4fd6c36693c7d96bda036a41dccffa4313b92940df6ad180982607744

                        SHA512

                        8beaad01c2f7541532842aca72324eeee7c582d50db2454bab3288dcb2922fdc1f2a0a3e2347a74e744e92c9f8304916c0f52a18754d2e3a5eb2fe6f9fbf6567

                      • C:\Users\Admin\AppData\Local\Temp\s7_bqeyh.cmdline

                        Filesize

                        166B

                        MD5

                        029c048bae7cf84047e448ff0a6d517a

                        SHA1

                        2188e20569c2eec605b20b5722d2a8737166f80a

                        SHA256

                        46b898514b7a0f4e8ae6754925db5929b32958ea5c8c9fe1526d5f727929c151

                        SHA512

                        f654e8621774f8c71c001361d93c24ca65f2d9d8af0704231737481f4eb8057c9c1a350235cc9f3fac8cb979502da8c76148c5bf67fda996c14aac36a3f475c4

                      • C:\Users\Admin\AppData\Local\Temp\tatdnjd0.0.vb

                        Filesize

                        271B

                        MD5

                        ac972015bef75b540eb33503d6e28cc2

                        SHA1

                        5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                        SHA256

                        fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                        SHA512

                        36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                      • C:\Users\Admin\AppData\Local\Temp\tatdnjd0.cmdline

                        Filesize

                        171B

                        MD5

                        72714396c866446f5015a02b5f303942

                        SHA1

                        3c6a845562a7f862d3bb36ed707056311fd68607

                        SHA256

                        3177c003f30287e8b752dfe195a4bd292f5a9a6ad41131148ac135268f846c7b

                        SHA512

                        fd99158334f7fe6397aeab1b9d07b729ececc89a4b44a8ab77413ef4270e3f0aa48f567c4420bf0aecd0356331ca4b5a90e00cb446b640a46b28335f5996886c

                      • C:\Users\Admin\AppData\Local\Temp\vbc69BB.tmp

                        Filesize

                        668B

                        MD5

                        3906bddee0286f09007add3cffcaa5d5

                        SHA1

                        0e7ec4da19db060ab3c90b19070d39699561aae2

                        SHA256

                        0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                        SHA512

                        0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                      • C:\Users\Admin\AppData\Local\Temp\vbc6A76.tmp

                        Filesize

                        684B

                        MD5

                        41857ef7e71c255abd4d5d2a9174e1a6

                        SHA1

                        95051d6ae43ff1bd9e5ebc95aa2e7b7c3165cb6c

                        SHA256

                        dfcdf12316f3b523895ec611d8e8d9fdc189ab8dde4e86fb962541aeac54e302

                        SHA512

                        ec6c5a7729d273be3ff194ffe47056731ab4100e298b7f50108a2599be59c84bd1953a90c4d7390c477257986a18d336d951f590b782f1aa983de7bd4c86e6ac

                      • C:\Users\Admin\AppData\Local\Temp\vbc6AE3.tmp

                        Filesize

                        684B

                        MD5

                        453916f7e3952d736a473b0e2eea5430

                        SHA1

                        b79ccb2b555a81b8db470ec9fcaea26d42ef1c8b

                        SHA256

                        b0f8b94a35a12060c70e9f81641be22cbf1f1794c73260f48a2e6e46608623fe

                        SHA512

                        86d32a03cf04ef8640075c82e5fecb23034413a41b80b81c900a423b03f44589f774f68f83561465e7c9ce46512c818eef5a90e5ed9f7b3f86b592be34fa367f

                      • C:\Users\Admin\AppData\Local\Temp\vbc6B70.tmp

                        Filesize

                        700B

                        MD5

                        6ed26221ebae0c285cdced27b4e4dbac

                        SHA1

                        452e9440a9c5b47a4f54aefdde36c08592e17a38

                        SHA256

                        aacdfb10fa949c74577bb1778fe2f3bab88b3e587c07cfffb003e059097e9e6c

                        SHA512

                        c604368a7b4adfbec5b6898c8880ea684bd085d967c1ebd087c9bed065fe3e2575c8298a9ccaa454d68496386667db998e2a04248dda2ab35905c8a9b1135cce

                      • C:\Users\Admin\AppData\Local\Temp\vbc6C89.tmp

                        Filesize

                        748B

                        MD5

                        b548259248343e12d417d6c938cf8968

                        SHA1

                        19703c388a51a7ff81a3deb6a665212be2e6589a

                        SHA256

                        ab2ce0a14c78f836d2b134a37183b6d89a78b964ea5607940fa5d940d32a0366

                        SHA512

                        73a3902f000a042a448446f6851d6ad61a30bfdfed7d7903b5dad0f368ee43cd6da3b8ba817ac95be1a7427902aba0642af8ccddc4d442867465f1f1f5bf6f81

                      • C:\Users\Admin\AppData\Local\Temp\vbc6D63.tmp

                        Filesize

                        676B

                        MD5

                        ba2c43095c1c82b8024e968d16bee036

                        SHA1

                        41ea006dbc9f0f6e80941d7547a980a1dde868e0

                        SHA256

                        1209067183104b41f03a5be0f377dc1865155cc84bdb509b871b7ce3366aae72

                        SHA512

                        00dc93cdb8c4cb0a681f99d24c59216a721bce963d76bad972e29cf92aafd74e4af46632c00f5aef4ce3160927db9df8aa9a8926ea4a5cb6974b499785569e61

                      • C:\Users\Admin\AppData\Local\Temp\vbc6E0F.tmp

                        Filesize

                        644B

                        MD5

                        dac60af34e6b37e2ce48ac2551aee4e7

                        SHA1

                        968c21d77c1f80b3e962d928c35893dbc8f12c09

                        SHA256

                        2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                        SHA512

                        1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                      • C:\Users\Admin\AppData\Local\Temp\vbc6ED9.tmp

                        Filesize

                        684B

                        MD5

                        7a707b422baa7ca0bc8883cbe68961e7

                        SHA1

                        addf3158670a318c3e8e6fdd6d560244b9e8860e

                        SHA256

                        453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                        SHA512

                        81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                      • C:\Users\Admin\AppData\Local\Temp\xk1ej0jq.0.vb

                        Filesize

                        262B

                        MD5

                        88cc385da858aaa7057b54eaeb0df718

                        SHA1

                        b108224d4686b5ca3faaeb1c728dfba8740a6eca

                        SHA256

                        08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                        SHA512

                        4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                      • C:\Users\Admin\AppData\Local\Temp\xk1ej0jq.cmdline

                        Filesize

                        162B

                        MD5

                        98ebe646e41e037331aa25941c6a295b

                        SHA1

                        314f86ffb4522e44767871e709bd111ec4cf3739

                        SHA256

                        c22b45b952e07af2d28bc7d89b806a99cb0a176d9a94235530c0c52faa808c44

                        SHA512

                        6a716e9cdb07c8e89224eba3d07db2271cad939798a7312c33b19dec6f488e3c8f393d4f2f92c4c535fa530c3d2d1ab1cb0e1673aca75d441498b8335bc2bcbe

                      • C:\Users\Admin\AppData\Local\Temp\zsp9yn8c.0.vb

                        Filesize

                        265B

                        MD5

                        cbdf61e7858f1274d58258756e185765

                        SHA1

                        15f0d177b5924a5176ff82f0b79bfa3db558145c

                        SHA256

                        d0aa53536d1316c420848db8bb089b24f9669f1baf3be092a7e0f0a0bc1b997d

                        SHA512

                        ab21cbb170e38a2600db2587ce92b74499107e361d55bbcd5e6281568307ffb1c087aba905c042e2e8960e2e554c84057a197dc4c03121b682868def94c5a038

                      • C:\Users\Admin\AppData\Local\Temp\zsp9yn8c.cmdline

                        Filesize

                        165B

                        MD5

                        3c419c7dada93a6159c766e9b12e6f88

                        SHA1

                        d740fd6a1fbf2f30af0c9441aced2eb00470463f

                        SHA256

                        8997be29a1c8b8c9c6dd3e8da543032b57329ecfdc04555db245ae8c77bc1fec

                        SHA512

                        77f55e9c4ff375b583405e0e66ab6b80a9f0bacc818bc711d22cb0dce540b2d0e8a0afae3ac1c36e2caaec9f6f7fa2b569e091b179cbaa5b6c0f4424ab004c1e

                      • C:\Windows\System32\MSSCS.exe

                        Filesize

                        21KB

                        MD5

                        6fe3fb85216045fdf8186429c27458a7

                        SHA1

                        ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                        SHA256

                        905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                        SHA512

                        d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                      • memory/2368-5-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2368-13-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2368-0-0x000007FEF616E000-0x000007FEF616F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2368-4-0x000007FEF616E000-0x000007FEF616F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2368-3-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2368-2-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2368-1-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2624-14-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2624-15-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2624-16-0x000007FEF5EB0000-0x000007FEF684D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2832-33-0x0000000002810000-0x0000000002818000-memory.dmp

                        Filesize

                        32KB

                      • memory/2832-29-0x000000001B630000-0x000000001B912000-memory.dmp

                        Filesize

                        2.9MB