Resubmissions

03-07-2024 16:04

240703-thygmaycpc 10

01-07-2024 18:12

240701-ws6xvswbkj 10

01-07-2024 18:03

240701-wm5sls1gka 10

01-07-2024 18:03

240701-wm39sa1gjf 10

01-07-2024 18:03

240701-wm2e7avhkj 10

01-07-2024 18:03

240701-wmzxcs1fre 10

01-07-2024 18:02

240701-wmzats1frc 10

01-07-2024 18:02

240701-wmvbwa1fqh 10

22-11-2023 17:02

231122-vkac9adg64 10

Analysis

  • max time kernel
    42s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-07-2024 18:02

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Drops file in System32 directory 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    PID:4928
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
        PID:5044
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
          3⤵
          • Command and Scripting Interpreter: PowerShell
          PID:3260
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cpl2xh-b.cmdline"
          3⤵
            PID:3464
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8BE0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3B3EC704791B45859197528E2A8615C1.TMP"
              4⤵
                PID:3180
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vtphktqh.cmdline"
              3⤵
                PID:4100
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8C4D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAE36F5E5279A432C8AB22A419B9A9133.TMP"
                  4⤵
                    PID:2148
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\n9kyslef.cmdline"
                  3⤵
                    PID:1108
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8C9B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC46240A34524EBE964E7FCFD8DC938.TMP"
                      4⤵
                        PID:3412
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\r_pozwgt.cmdline"
                      3⤵
                        PID:3956
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8CE9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDACB05C9B4F949228280AAB36D62E99.TMP"
                          4⤵
                            PID:4236
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hgvw7gmj.cmdline"
                          3⤵
                            PID:2800
                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8D47.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1A7D1109F8174552A5D7B4315F92883F.TMP"
                              4⤵
                                PID:2292
                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\x3ymucsc.cmdline"
                              3⤵
                                PID:1224
                                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8DA5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC725197AA0AB4B90A6A6A8483C6D653.TMP"
                                  4⤵
                                    PID:4504
                                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6h6b0mw9.cmdline"
                                  3⤵
                                    PID:1180
                                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8DF3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDDED94D72A0D4A9DA6CB58AD6F651A1.TMP"
                                      4⤵
                                        PID:2868
                                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gpwnbzbm.cmdline"
                                      3⤵
                                        PID:2792
                                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8E51.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc440CA5E66F40467AAAE1F626315DFA6E.TMP"
                                          4⤵
                                            PID:1292
                                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\i7scl_q7.cmdline"
                                          3⤵
                                            PID:4932
                                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                                              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8E9F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc524FA5FBA3FE40ECB93AE2251B6BE5EA.TMP"
                                              4⤵
                                                PID:2532
                                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                                              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nbc8mqi2.cmdline"
                                              3⤵
                                                PID:2456
                                                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                                                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8EFC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc96ED8EDCE2D2449CAD3C94169211BD7.TMP"
                                                  4⤵
                                                    PID:4928

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\Local\Temp\6h6b0mw9.0.vb

                                              Filesize

                                              274B

                                              MD5

                                              539683c4ca4ee4dc46b412c5651f20f5

                                              SHA1

                                              564f25837ce382f1534b088cf2ca1b8c4b078aed

                                              SHA256

                                              ec2210924d5c1af6377ef4bdf76d6ca773aaa1ae0438b0850f44d8c4e16ef92e

                                              SHA512

                                              df7c1a55e53f9b9bf23d27762d2d1163c78808e9b4d95e98c84c55ca4ecb7009ed58574ae6ddede31459f300483a1dc42987295a04f6c8702f297d3f1942f4ac

                                            • C:\Users\Admin\AppData\Local\Temp\6h6b0mw9.cmdline

                                              Filesize

                                              174B

                                              MD5

                                              b15a48dec41edb1c24a57ce09c360c08

                                              SHA1

                                              6c757c442e8f5dd930bddc187b1d79491ec2fee3

                                              SHA256

                                              3992533e0cd2fa1d310232bd949f2956648f5ba34af263427c98f9352d1929e5

                                              SHA512

                                              bf0ccc6053898c44fa25181eab1a97080f709a6a0e5f0e1c2d056ac94a0c4c401fad9a73209f9562009b0d6b3dd0e5071a55501de82383db99ce3b4ede845927

                                            • C:\Users\Admin\AppData\Local\Temp\RES8BE0.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              8546769f51da1c545b22a1aea52e9853

                                              SHA1

                                              6adebe6cd95fad5329688cd5c9ad77fefc9c66da

                                              SHA256

                                              e6cdbe76dadd3db954dbdd9044f33959dd83eaa26e2359bd8261238f41f5ae90

                                              SHA512

                                              c2d69497daf3d8b9a521cc0888f40fad8a0363fa7a1432b4fee92e479b3931c987d578346bc7c9ffcb09ddb67322a180b38e72bb08aa691eb165f267a5b42021

                                            • C:\Users\Admin\AppData\Local\Temp\RES8C4D.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              b919ed39a5414c2647375843f2fd5e9a

                                              SHA1

                                              d117f517702de40c76adc86927129fede3582b76

                                              SHA256

                                              b85f8aed16f5adc38298d2551cdac8094233532dc614195565e5fe8fdc8133fa

                                              SHA512

                                              3882833c22129bd702903ca78b01fbdf14a71fbc41609515697e2e35e4a6ab74cd3310fcf5c07b12e4aa11386d24a91f5905b49a7bf71bffd06589664bb1bbb8

                                            • C:\Users\Admin\AppData\Local\Temp\RES8C9B.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              bcad3209065efa11725205158d918011

                                              SHA1

                                              2c0967be855f5352f2c68a4c4580adc5c43b5cb1

                                              SHA256

                                              60afa87a5c6751b86b446dce34f86bd0a59c1a9d91cc83b29f33f02c60d484b6

                                              SHA512

                                              ac0ea617e19ae1494c885e35aa3ae6ee8e0061d7b24efd7056f3751451c1a2aa54854a594a2d6d774c5c745cbf39e77f0761deeed2ebc889ddd41f599ee8b4ad

                                            • C:\Users\Admin\AppData\Local\Temp\RES8CE9.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              2576b9ba175b6d9c5e38ce6a92a32a05

                                              SHA1

                                              e2d9e3804a12c167db47abb0795cfa30d5ba6ecd

                                              SHA256

                                              43786f6ae0242c61918e4f6c7e0758b75a246dc9027696ce51e86f56c4970a59

                                              SHA512

                                              2dda1930d0383379ddf70f5c2905fbd35d4620d6386cde11bc70ee916a8dc32401aca1d1fd1a46a50fb7117c4190f9d53604539b50d4d064d16d0c2a34e84735

                                            • C:\Users\Admin\AppData\Local\Temp\RES8D47.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              3b68003593de4a30e7cbfa27fe8c3d07

                                              SHA1

                                              40b2e51b0f31abec8fb83033564c4e1f50e593d5

                                              SHA256

                                              f6eee8d5c3b21d371112211530ce4a20b2ce186952adcd523d2bec805802e074

                                              SHA512

                                              78222a523dd9c8724016c007b9bb4cce4396d9b80c5202340c8486f8f63080785ba2c2c103e11e3686ff418f7db82f3b26b1fbb7be9111563a81c6eb539b8e38

                                            • C:\Users\Admin\AppData\Local\Temp\RES8DA5.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              4d785971fc0c359e244c09784a183e20

                                              SHA1

                                              6cea587c0af592b954843ac1cf9afb68b7bd0140

                                              SHA256

                                              ea387074c06d8ba4003acf59b825f18a7c6283367a8233bb808cda64aabb31e0

                                              SHA512

                                              2c87e90483b0eeb026e7a21ef52371b92ea759282d8aea37e41b88ce0dfcb972c9dc75fa9dd8119be9fa9df5ff399a9ed5843984ece29ba375067a23abe30a9c

                                            • C:\Users\Admin\AppData\Local\Temp\RES8DF3.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              70d17f705ec117953444de63c1f48649

                                              SHA1

                                              85ac32a2a10af1737a2dd85288e9326cdf1c5590

                                              SHA256

                                              b933ee5151e2593060931af5c2a4e065e9a277adc6fcc764840f4afded4df3e9

                                              SHA512

                                              417405d389bcca318473fe8ac7d5b4ae6747aab244ff4eb1928453720be383e66c0ad12f8926ec37b7c54a4f779e80e8d6d765148fa1fb83cb3571956e53b331

                                            • C:\Users\Admin\AppData\Local\Temp\RES8E51.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              860f6090a6a1298fb00691b96bb5d58a

                                              SHA1

                                              6ef5b3f6dff5d246e4765f0f87f76e82b53fc2ef

                                              SHA256

                                              8b0958dc0b31ef790a05f53a04d9fb8ea42ef75a39e60d276418c6e9b46e5b1b

                                              SHA512

                                              92674697e3afd79a469e6424986846b027beaafa3126f5c3f954b7b47ceccfc913d560f4eae713d0cf91cd96d1be93a13b7faa062949391a0c8158d2fda35916

                                            • C:\Users\Admin\AppData\Local\Temp\RES8E9F.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              0c0a85be6ac2e612ef4fd6007425f9ad

                                              SHA1

                                              f2cf50e852ea4a3e58e2896ed77dfe1001b28f00

                                              SHA256

                                              dffee9e90d9739ea0b12059ef49deb3b353bef937da5d52a8cc27dbf0e582137

                                              SHA512

                                              6323e9c932c83b6c98ce74232a640b1f326d040ebc6b823e8c0efcd86778ea867dc7c3552f09dc116f30a8755de826cb28d6cfabb5356fe109d33b532253e579

                                            • C:\Users\Admin\AppData\Local\Temp\RES8EFC.tmp

                                              Filesize

                                              1KB

                                              MD5

                                              fd6421c73dedaaa2f1cfb3ea78d3aceb

                                              SHA1

                                              378eb6243ca5b1a5dd0471f7e66cf90109bf5a10

                                              SHA256

                                              3d10f40ca61679c258021a1b3e8dc5dc4529a3e7e5a47be208fe5aa120b3de8c

                                              SHA512

                                              baee1788c0661644bc4d3aeba92a17729e0370cfd155dfe4f2c6355b4283e957353a8b3e8cb921a78848adbcc7db0288cffd8579fde7aecf8413911ea808bfff

                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jfikjfw1.b0s.ps1

                                              Filesize

                                              60B

                                              MD5

                                              d17fe0a3f47be24a6453e9ef58c94641

                                              SHA1

                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                              SHA256

                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                              SHA512

                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                            • C:\Users\Admin\AppData\Local\Temp\cpl2xh-b.0.vb

                                              Filesize

                                              256B

                                              MD5

                                              076803692ac8c38d8ee02672a9d49778

                                              SHA1

                                              45d2287f33f3358661c3d6a884d2a526fc6a0a46

                                              SHA256

                                              5b3ab23bcadaeb54a41bdb1636bcaf7772af028d375f42baeb967de6579ef2a3

                                              SHA512

                                              cc9126384a287ccb99d10d5c2d3034cdbc8a45e94f1cec48dd95f2aa08ebbe3053ffd6d6effa31f2d84164edbb6136398cd02c08b05f027a6a777dffd1daea5d

                                            • C:\Users\Admin\AppData\Local\Temp\cpl2xh-b.cmdline

                                              Filesize

                                              156B

                                              MD5

                                              991179ab2b9204dfc554281367cffbd3

                                              SHA1

                                              eb3d5d46fde6835706e9840d4d3bb62437309ee3

                                              SHA256

                                              528fc67b524c2d1ef459bce14889b59867929ced51cff1ee8819777d42809cb1

                                              SHA512

                                              c4bf0f3b0fc89aee86bd98bbeefff1b40cdd53d5d54904a1dbd4002c42f60d17f3bc943425c9eb1e0723a6d9cc74f06bc512fdef9ceb4ce564347ab4f0eddd46

                                            • C:\Users\Admin\AppData\Local\Temp\gpwnbzbm.0.vb

                                              Filesize

                                              264B

                                              MD5

                                              5ce3977a153152978fa71f8aa96909e9

                                              SHA1

                                              52af143c553c92afc257f0e0d556908eaa8919cb

                                              SHA256

                                              e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                                              SHA512

                                              eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                                            • C:\Users\Admin\AppData\Local\Temp\gpwnbzbm.cmdline

                                              Filesize

                                              164B

                                              MD5

                                              c821b87a47a0903edb22e3c91fb26392

                                              SHA1

                                              fe08882dcc023fd83f981c02f0f56764f2237d2b

                                              SHA256

                                              1aed1c978997e1a660a9521fad61f61d9522f3648928a7c1c5900def9f402000

                                              SHA512

                                              944e05b6f899b459572ae74ab526edcb570b313f4c55023f921441149307bf8d599d9b2bcf12af678180bdef3c10a38d9647fb37485936c0c3f6c95423ecee53

                                            • C:\Users\Admin\AppData\Local\Temp\hgvw7gmj.0.vb

                                              Filesize

                                              272B

                                              MD5

                                              2b3aac520562a93ebef6a5905d4765c9

                                              SHA1

                                              10ab45c5d73934b16fac5e30bf22f17d3e0810c8

                                              SHA256

                                              b9f0edf067faaaa7da2d47e3d22b957cd302eb25e01e08ea79c664868f328f89

                                              SHA512

                                              9514934ed12d93ea3ad4e6873cf294bafa114bc7a784a93b14dd2410d07fae3a2c00308035a5c129c57e283de8b94ed36fd9f9de35b08eb79a82a0c732e50446

                                            • C:\Users\Admin\AppData\Local\Temp\hgvw7gmj.cmdline

                                              Filesize

                                              172B

                                              MD5

                                              ff78235743fb22f25e0e6706e026a38b

                                              SHA1

                                              f57e179f56a896effb0e1baad6dbdb4d05e0a0be

                                              SHA256

                                              ca12c38076be264eb6877264741e06a5e660b104a3c8482a5d612d16997654ea

                                              SHA512

                                              a7f4717314bd91d9464a64246a787c6304d5ae4b91952fd96f05bb9134dae9abc6835c6070b5ce808a5efe8533e1043699b95d5c7f068acbaf3fa2fbce7180dc

                                            • C:\Users\Admin\AppData\Local\Temp\i7scl_q7.0.vb

                                              Filesize

                                              270B

                                              MD5

                                              658573fde2bebc77c740da7ddaa4634b

                                              SHA1

                                              073da76c50b4033fcfdfb37ba6176afd77b0ea55

                                              SHA256

                                              c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                                              SHA512

                                              f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                                            • C:\Users\Admin\AppData\Local\Temp\i7scl_q7.cmdline

                                              Filesize

                                              170B

                                              MD5

                                              080f72ab55e1576c0348847affa74c9e

                                              SHA1

                                              eae80213e9d0c269aa1136f210b8122a47d904a6

                                              SHA256

                                              b13a12a9fe7d6b71a72935a0d816b48ccf6c6ce73d93b2a1ff4b52f649edc433

                                              SHA512

                                              97f1bc1d10a798a5bdab33f82e6973a41dc75e2773b8e754d8e9d3d597e4c1cc15d54fa4d0977249f6495e0fa3e41308e01ec2f53919567b953ee40aa1fdd258

                                            • C:\Users\Admin\AppData\Local\Temp\n9kyslef.0.vb

                                              Filesize

                                              263B

                                              MD5

                                              d1110a95f1e40f726584bd99eca52fe7

                                              SHA1

                                              97fac683e1116ab31a9cc9c3dcfd9fe9e53505c3

                                              SHA256

                                              00f373eb310beace70146b6e0fd188aa2f437efb2e5a2714a11d4d58e27d3142

                                              SHA512

                                              f15b5b310ace82a0106b551d71ad3d48e1c75085aa78b8bb3374a2334ceb073bd4d1bf4cd0b4e39034c39f01b6bcd76e8be30198e4872f5641a7d29b255154b4

                                            • C:\Users\Admin\AppData\Local\Temp\n9kyslef.cmdline

                                              Filesize

                                              163B

                                              MD5

                                              674dde4d44f2dd46827439965030f5df

                                              SHA1

                                              c83ca8ae83b2f98d01e5262634e263ef5fe1a5f6

                                              SHA256

                                              73903c8ec1c99bdcc407f3dc6e73e081f69eead2bd055d43f3cb8dc64496ca01

                                              SHA512

                                              9819f98f4b77a8e5141eab41f6ce6d2b72bd372d7f3970894415caf20d86858f701548768a0c357423013374690c43404e6b5afa5fba416825b8f05c253719eb

                                            • C:\Users\Admin\AppData\Local\Temp\nbc8mqi2.0.vb

                                              Filesize

                                              273B

                                              MD5

                                              3c3d3136aa9f1b87290839a1d26ad07a

                                              SHA1

                                              005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                                              SHA256

                                              5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                                              SHA512

                                              fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                                            • C:\Users\Admin\AppData\Local\Temp\nbc8mqi2.cmdline

                                              Filesize

                                              173B

                                              MD5

                                              8516da7f9d101231a5bcadb3700bc7b2

                                              SHA1

                                              a0e8a1519353c69b3adaa6eed526babe91d720f7

                                              SHA256

                                              e78605bd39e4a660e2a216b01edc48b5a0703f2a6829450b645fc89c8574b673

                                              SHA512

                                              125e6cfa0d2fc5e577c62e9fbd81af0707b4a4d432771162daa7716de173242a083ebe57fe2b799514f3e161c0065e52f8d7325bffb785312d054a4ba774c95c

                                            • C:\Users\Admin\AppData\Local\Temp\r_pozwgt.0.vb

                                              Filesize

                                              271B

                                              MD5

                                              ac972015bef75b540eb33503d6e28cc2

                                              SHA1

                                              5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                                              SHA256

                                              fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                                              SHA512

                                              36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                                            • C:\Users\Admin\AppData\Local\Temp\r_pozwgt.cmdline

                                              Filesize

                                              171B

                                              MD5

                                              4b1042a749511fbb8b9b34ca9c523ae0

                                              SHA1

                                              b9d2fabb679e1b940e6da9fb5031334fa8caf3d6

                                              SHA256

                                              3a9c94242375c983a41bd2111c75cc40343d7fa25a95ce7dd146224773eb6716

                                              SHA512

                                              84b6d35a70a5e4136de73718dce1e90aba7a4c7de024674dcd3fb983b248d2d36bde110e7e1fb6df05d9228cd462947247c8d21f2268231cd0a7ea07d79283f7

                                            • C:\Users\Admin\AppData\Local\Temp\vbc440CA5E66F40467AAAE1F626315DFA6E.TMP

                                              Filesize

                                              644B

                                              MD5

                                              dac60af34e6b37e2ce48ac2551aee4e7

                                              SHA1

                                              968c21d77c1f80b3e962d928c35893dbc8f12c09

                                              SHA256

                                              2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                                              SHA512

                                              1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                                            • C:\Users\Admin\AppData\Local\Temp\vbc524FA5FBA3FE40ECB93AE2251B6BE5EA.TMP

                                              Filesize

                                              668B

                                              MD5

                                              3906bddee0286f09007add3cffcaa5d5

                                              SHA1

                                              0e7ec4da19db060ab3c90b19070d39699561aae2

                                              SHA256

                                              0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                                              SHA512

                                              0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                                            • C:\Users\Admin\AppData\Local\Temp\vbc96ED8EDCE2D2449CAD3C94169211BD7.TMP

                                              Filesize

                                              684B

                                              MD5

                                              7a707b422baa7ca0bc8883cbe68961e7

                                              SHA1

                                              addf3158670a318c3e8e6fdd6d560244b9e8860e

                                              SHA256

                                              453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                                              SHA512

                                              81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                                            • C:\Users\Admin\AppData\Local\Temp\vbcC725197AA0AB4B90A6A6A8483C6D653.TMP

                                              Filesize

                                              676B

                                              MD5

                                              85c61c03055878407f9433e0cc278eb7

                                              SHA1

                                              15a60f1519aefb81cb63c5993400dd7d31b1202f

                                              SHA256

                                              f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b

                                              SHA512

                                              7099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756

                                            • C:\Users\Admin\AppData\Local\Temp\vbcDDED94D72A0D4A9DA6CB58AD6F651A1.TMP

                                              Filesize

                                              684B

                                              MD5

                                              8135713eeb0cf1521c80ad8f3e7aad22

                                              SHA1

                                              1628969dc6256816b2ab9b1c0163fcff0971c154

                                              SHA256

                                              e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a

                                              SHA512

                                              a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4

                                            • C:\Users\Admin\AppData\Local\Temp\vtphktqh.0.vb

                                              Filesize

                                              262B

                                              MD5

                                              88cc385da858aaa7057b54eaeb0df718

                                              SHA1

                                              b108224d4686b5ca3faaeb1c728dfba8740a6eca

                                              SHA256

                                              08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                                              SHA512

                                              4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                                            • C:\Users\Admin\AppData\Local\Temp\vtphktqh.cmdline

                                              Filesize

                                              162B

                                              MD5

                                              0918dd80f2f0cad99bf5c42b4cf4cb98

                                              SHA1

                                              df160d7d09b53a0aaaabb2d2a757f06cc413494d

                                              SHA256

                                              e8f8295a6ecd0dee38f531e56ac39ca82adaaa1a590bec13f295e596386af416

                                              SHA512

                                              9211259069c7db516184d9c3c7f5098f1615ccec1d0db46860a9dd1c94f2391fe514cf0822757486fdd4f8fa0c8bb86d7f6c79216c14b73c21fb3735d5caae4f

                                            • C:\Users\Admin\AppData\Local\Temp\x3ymucsc.0.vb

                                              Filesize

                                              271B

                                              MD5

                                              325f27ef75bebe8b3f80680add1943d3

                                              SHA1

                                              1c48e211258f8887946afb063e9315b7609b4ee3

                                              SHA256

                                              034c75813491d628a1a740b45888fc0c301b915456aaa7ba6433b4f1368cda35

                                              SHA512

                                              e2165b425558872897990953c26e48776f45751a53da035f1ad86ac062ec23a2923b984d84f992de5c0170f6e192feb155ffff25f51bc76ab273b996daacb804

                                            • C:\Users\Admin\AppData\Local\Temp\x3ymucsc.cmdline

                                              Filesize

                                              171B

                                              MD5

                                              675608ffabda7d195e3a64f9a853c737

                                              SHA1

                                              45abbd2dc45f92adbe63af18d97f848ce18a07f2

                                              SHA256

                                              bb087b5415382b0c7fef9fa0f25aed06c0a27bfb850d39d9a76d712e29768ec1

                                              SHA512

                                              2fa342a8ad56f34dc4cb5896d5f18a55d9101e966b98f0d572d6a7435d6d241c0293e68edaf3c427c9e69e71160df6a256ab996e5348e95700eadd3fc97f3b52

                                            • C:\Windows\System32\MSSCS.exe

                                              Filesize

                                              21KB

                                              MD5

                                              6fe3fb85216045fdf8186429c27458a7

                                              SHA1

                                              ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                                              SHA256

                                              905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                                              SHA512

                                              d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                                            • memory/3260-40-0x0000015D78CC0000-0x0000015D78CE2000-memory.dmp

                                              Filesize

                                              136KB

                                            • memory/4928-0-0x00007FFE89D95000-0x00007FFE89D96000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4928-4-0x000000001C500000-0x000000001C5A6000-memory.dmp

                                              Filesize

                                              664KB

                                            • memory/4928-1-0x00007FFE89AE0000-0x00007FFE8A481000-memory.dmp

                                              Filesize

                                              9.6MB

                                            • memory/4928-20-0x00007FFE89AE0000-0x00007FFE8A481000-memory.dmp

                                              Filesize

                                              9.6MB

                                            • memory/4928-3-0x000000001C030000-0x000000001C4FE000-memory.dmp

                                              Filesize

                                              4.8MB

                                            • memory/4928-2-0x00007FFE89AE0000-0x00007FFE8A481000-memory.dmp

                                              Filesize

                                              9.6MB

                                            • memory/4928-8-0x00007FFE89D95000-0x00007FFE89D96000-memory.dmp

                                              Filesize

                                              4KB

                                            • memory/4928-7-0x00007FFE89AE0000-0x00007FFE8A481000-memory.dmp

                                              Filesize

                                              9.6MB

                                            • memory/4928-6-0x000000001CF00000-0x000000001CF9C000-memory.dmp

                                              Filesize

                                              624KB

                                            • memory/4928-5-0x000000001C620000-0x000000001C682000-memory.dmp

                                              Filesize

                                              392KB

                                            • memory/5044-19-0x00007FFE89AE0000-0x00007FFE8A481000-memory.dmp

                                              Filesize

                                              9.6MB

                                            • memory/5044-22-0x00007FFE89AE0000-0x00007FFE8A481000-memory.dmp

                                              Filesize

                                              9.6MB

                                            • memory/5044-18-0x00007FFE89AE0000-0x00007FFE8A481000-memory.dmp

                                              Filesize

                                              9.6MB

                                            • memory/5044-21-0x00007FFE89AE0000-0x00007FFE8A481000-memory.dmp

                                              Filesize

                                              9.6MB