Resubmissions

13-11-2024 23:34

241113-3kmbta1eqc 10

13-11-2024 22:28

241113-2dpb6azme1 10

11-11-2024 05:34

241111-f9w6zstjbz 10

11-11-2024 03:05

241111-dlmlja1jbx 10

11-11-2024 03:00

241111-dhk9aszrdz 10

08-11-2024 08:59

241108-kx2cdssjdk 10

08-11-2024 08:55

241108-kvvf3aymdw 10

Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-11-2024 03:00

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2328
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oro86pxn.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD8E3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD8E2.tmp"
          4⤵
            PID:784
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tcz6q4sx.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1808
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD921.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD920.tmp"
            4⤵
              PID:2152
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6k7fuds3.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1944
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD9AD.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD9AC.tmp"
              4⤵
                PID:1648
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-6-yu708.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1736
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD9DC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD9DB.tmp"
                4⤵
                  PID:1728
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wshjsq8c.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:724
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDA97.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDA96.tmp"
                  4⤵
                    PID:2268
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rfjvv1ar.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1320
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDAD6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDAC5.tmp"
                    4⤵
                      PID:2220
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bxvdnx4x.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1540
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDB14.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDB13.tmp"
                      4⤵
                        PID:2988
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\8o86fnm_.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:792
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDB53.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDB52.tmp"
                        4⤵
                          PID:2244
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\c7kutfbt.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2424
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDB81.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDB80.tmp"
                          4⤵
                            PID:2416
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\z0ljfmdu.cmdline"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2532
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESDBCF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDBCE.tmp"
                            4⤵
                              PID:2264

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\-6-yu708.0.vb

                        Filesize

                        269B

                        MD5

                        d8ec3923c7b4bf7ae4ba2dd32ba5174f

                        SHA1

                        bd232f852b5428b0360c9708604793deb513c36e

                        SHA256

                        316f5f33d99324745cbdad4dfe3ece93321e270a177f3646d78d72d1f7a1d648

                        SHA512

                        062694e7951b534e5c93d4d2e65c65cc59b9be7f3f1e469b1679d61e03f1770246222009461c6e2a8ddfe41fa367ed6ebd83f53e0a1c3f24db5e97932558ce11

                      • C:\Users\Admin\AppData\Local\Temp\-6-yu708.cmdline

                        Filesize

                        169B

                        MD5

                        4d64a39069a26f4683e4ab0a1df34dc3

                        SHA1

                        7bf5bdc76ed33cdbd76ce6954854b94163a2e2ec

                        SHA256

                        4d324209bed59b901304d2a35607aeeb1f57c0cebad3bfd642f77daa548fbe66

                        SHA512

                        b91f106e2964701c25b467e1138199b5231191cda22ca3b8307896cb58b0fb3d51e8e313349a9b46d2e95d225bd55532e81b9ae6e961ba27e72653e9afc3a238

                      • C:\Users\Admin\AppData\Local\Temp\6k7fuds3.0.vb

                        Filesize

                        265B

                        MD5

                        cbdf61e7858f1274d58258756e185765

                        SHA1

                        15f0d177b5924a5176ff82f0b79bfa3db558145c

                        SHA256

                        d0aa53536d1316c420848db8bb089b24f9669f1baf3be092a7e0f0a0bc1b997d

                        SHA512

                        ab21cbb170e38a2600db2587ce92b74499107e361d55bbcd5e6281568307ffb1c087aba905c042e2e8960e2e554c84057a197dc4c03121b682868def94c5a038

                      • C:\Users\Admin\AppData\Local\Temp\6k7fuds3.cmdline

                        Filesize

                        165B

                        MD5

                        e2b57c0581b5639724f7ad35613a8a14

                        SHA1

                        a966eb0df3b9508ebbf374196517a0098df6c6cb

                        SHA256

                        890a7160fbbb958f4f46770f4b2ef377b5f706b1704355999de8b534bb6b7dbd

                        SHA512

                        908fe8328afccea3931630a614d69be526308bcc8a4293b262cf52fce7ccfdf4ded96afd11f03c1a9988780bb9b057f47dd1c682616ccdcae2513f892c94645d

                      • C:\Users\Admin\AppData\Local\Temp\8o86fnm_.0.vb

                        Filesize

                        264B

                        MD5

                        5ce3977a153152978fa71f8aa96909e9

                        SHA1

                        52af143c553c92afc257f0e0d556908eaa8919cb

                        SHA256

                        e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                        SHA512

                        eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                      • C:\Users\Admin\AppData\Local\Temp\8o86fnm_.cmdline

                        Filesize

                        164B

                        MD5

                        0a6ab4653319c0b68d7c13724a130431

                        SHA1

                        0b44b7edcc80680a25648829660ae372760d518d

                        SHA256

                        ba58c7b985a9b3c815b3ae33ddcbaa9e641e2e62a225479fea6d2f6cac145fa5

                        SHA512

                        c197815510fbc716e2c7a404ddfc9eacd7453e6c1b1e1e9a8c0bfffa2a5f69b209edb88f966e31e820f66db08002e1f25fcae297fdb7f0222eedc5974f9ecdf3

                      • C:\Users\Admin\AppData\Local\Temp\RESD8E3.tmp

                        Filesize

                        1KB

                        MD5

                        5cd05626e5412a7abf0356119f16aebd

                        SHA1

                        1738eeab65f7582387e12229c372aafb7fe9f529

                        SHA256

                        00a830088b18cfb56a38f5b2a99e4bdf9f88d26788f19dd8d44e3e7794176517

                        SHA512

                        f52c063dc3b302ee89275606c397ba525e15b855a79d88fe2dea9881941ecda15f326e2c440d2cca24f7ead0ecbb2a4b58951ae8e137a4654d3bcf01f4fd0cd6

                      • C:\Users\Admin\AppData\Local\Temp\RESD921.tmp

                        Filesize

                        1KB

                        MD5

                        68fc7ac58b24f8ba56b01e4e19af3401

                        SHA1

                        db34eb2993dcc3a5b291ed9e4832fe04addc45d6

                        SHA256

                        394c0dd450f9e77dcc0b9163247be3028f3c83acae94cb122e93b1796e650194

                        SHA512

                        d8663d04f2506964d24721f41ab0f6aff1057f712b0911cca94b3a9f5061c394220e5a596aa35b40da156cd5ba85ca659445b56a92e12743ac188b1f041afa03

                      • C:\Users\Admin\AppData\Local\Temp\RESD9AD.tmp

                        Filesize

                        1KB

                        MD5

                        30b92ae4e5cafbd1e3dec5cdd8eb1168

                        SHA1

                        a349ec10836d4f08fd56d1a2d9bf42d87c4a4650

                        SHA256

                        290cb3c952c2beae6f16a8b0581dc52534bf654e2d0be2a693b7553d59daa103

                        SHA512

                        ee981d37d7b245db1976c705a0e6cc39d608f953499d06f9fedd8355de566979a87c909cb38c0fbc70c4f726af385f9d9e09a361e5a31284b7e70ffaf9179671

                      • C:\Users\Admin\AppData\Local\Temp\RESD9DC.tmp

                        Filesize

                        1KB

                        MD5

                        6f9e7646579dbf9eb1b13ef0800a70c3

                        SHA1

                        b1c50524a6107caf07d51ee557a7f6e0f932a872

                        SHA256

                        39c83b34efa91fd757000d5bc682d04a72b73ce8eba18282a2e16b4ceb1a440a

                        SHA512

                        a95da2b8a1a269a7097e83ada7c0befdceb7973449bac2099b5b42da0744b64cdd791fc46898dd43e498ac619d8b15aa51983b020d8c2932f3c2363e9e20060f

                      • C:\Users\Admin\AppData\Local\Temp\RESDA97.tmp

                        Filesize

                        1KB

                        MD5

                        318db5d54e20d96c6ad02b4b5d952ada

                        SHA1

                        6cf3e8cd7ab873179309cbb88537b970188af0e8

                        SHA256

                        261e36ad3802913f6721fb7a8ab0a2e535557c8d2410a2e3815c8a3246ed9243

                        SHA512

                        c3db52580cfbaffb512e2699283e55d12c3493c9d44b510407fd2bde929d0716092958cd8f9647ae4f13c2e8317e2338b9fd23ee32b5ec92c65f8327f11782fd

                      • C:\Users\Admin\AppData\Local\Temp\RESDAD6.tmp

                        Filesize

                        1KB

                        MD5

                        2a36a5fdd89565b2401ed899f96dded7

                        SHA1

                        5fdcef8370f41d9eb63cd9c42ad6fa92787ab452

                        SHA256

                        950e37f8309252784fc500788cea434686ac575cc12beaf66555cf3201a965ae

                        SHA512

                        6220be177a22a139e38bd882617986f69346fd7ad70dc779a4d286a2dd8a1449b90b4ec3f4bf9d47059a8141fabc221f16a2faf12ebe6e07641cf3045c9a1811

                      • C:\Users\Admin\AppData\Local\Temp\RESDB14.tmp

                        Filesize

                        1KB

                        MD5

                        91d3c2fe1f814d7a1fd2b2b0268745a3

                        SHA1

                        b1cafeece140ee6aecd3bfb6b71ec7755a886386

                        SHA256

                        4c4f5068221504ed726d0756eb0ceddac7d6a51a4cf2d9afccf60decf126f57e

                        SHA512

                        a84e8059a5c61daff59e43e224fcc7d7d2dbbf6874802745839b0c602f3416a526a862f813a624f0b10fdd8c6b37ee8e26bf40828134116bb75a4f3bee66d18e

                      • C:\Users\Admin\AppData\Local\Temp\RESDB53.tmp

                        Filesize

                        1KB

                        MD5

                        27ed9ebd55ffc8317165cfe34406ecef

                        SHA1

                        0553f60e13e45f35e5875cd4bdcfcae876ff0662

                        SHA256

                        9f1d70662108d4faa890c1e7b9e2c17636521bc17f861a6122f33c50f18a5ddf

                        SHA512

                        4274905e86f600638a172dbc75969170f7a7d7971b82ede7095ac2d36f1f2bf748ab949546ca4da612c9814ca9480cc97f474bbad4266bce9784552e86000368

                      • C:\Users\Admin\AppData\Local\Temp\RESDB81.tmp

                        Filesize

                        1KB

                        MD5

                        868f0e6afd4647afdfacb3ebfc6c4259

                        SHA1

                        565f14e4e8c22b3efe365f236273945c626a12e1

                        SHA256

                        6df128d5079a7b8d3bd59b9c812be83ee9ba1db4afb2c3ca71847a0e0c73ba76

                        SHA512

                        160eca86640d3ce78a95bb401994e599cd43cd991fbe68cb9c3480bb60ba26c4b0c64d6fb88132be7e656231cfd96b40317cd752e96bd1f81455ffcf6619227a

                      • C:\Users\Admin\AppData\Local\Temp\RESDBCF.tmp

                        Filesize

                        1KB

                        MD5

                        e127696b194e3b2c4c044545aca3474d

                        SHA1

                        5a23f715a812c0572d912173ecc48198151b87c6

                        SHA256

                        ff1f47d9bb7c3e6e00651b523bdd1577c728fa9fd94c4f73ebd6c7ec3993f4f1

                        SHA512

                        6cdd1a44186eca49f751d51ee06668c883877e0149396224403bab1478c0237716c060e689b85d08669a688879004b5f23586320e69e519f8698e1bfebb68dd6

                      • C:\Users\Admin\AppData\Local\Temp\bxvdnx4x.0.vb

                        Filesize

                        271B

                        MD5

                        b19384e98248a2c238e2360d2fecf049

                        SHA1

                        25f5ab6303d0a81f4ef3cc44c0bb53dd3e564fad

                        SHA256

                        296feb4019e37af5174b813d3ac19fa1b17c4db9ad91b06eba610939983e3262

                        SHA512

                        e9e4dd4a302d643fd1d0dd46d058ca7a45c8e6d8b299c129e1a412d1d3309cfe4d4da6f9d893460dde7e96c40414d65e02dbab9c1411dd945581e749ae8438e4

                      • C:\Users\Admin\AppData\Local\Temp\bxvdnx4x.cmdline

                        Filesize

                        171B

                        MD5

                        3c1f7c19d8d1280e3cc76db0986a0c4d

                        SHA1

                        3da2ea0fd6fa3f8076210340d4ba319a617953f6

                        SHA256

                        81a92c91491dd49dc893a2896144f0b93155e6eae6fd24e9922ad72163163899

                        SHA512

                        c8cfa73cd04fe79b36ae1f0e77116ec913da3903347f105668fae48c52bab53fc5aec9d59be2c3c8b6d302235b7d5bcd9c51e3a2dfcc8a754699eadf6ed0c105

                      • C:\Users\Admin\AppData\Local\Temp\c7kutfbt.0.vb

                        Filesize

                        270B

                        MD5

                        658573fde2bebc77c740da7ddaa4634b

                        SHA1

                        073da76c50b4033fcfdfb37ba6176afd77b0ea55

                        SHA256

                        c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                        SHA512

                        f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                      • C:\Users\Admin\AppData\Local\Temp\c7kutfbt.cmdline

                        Filesize

                        170B

                        MD5

                        97e266a15f3931ff79daca3a6daf9796

                        SHA1

                        9d5c473fd27c4536deba876d8630f597ebd10902

                        SHA256

                        9c3c012cfb9ddd367eee1b6773310fe8ec08653571c89f14b2c309b44ffa65fc

                        SHA512

                        80298b781256b5555b8221f3d5662f2d91a237217a95ad9e17754eb6b3c60192a80281b4b89c97d35aef72e08b955ccd22cce19de613a60a0255660222ce861b

                      • C:\Users\Admin\AppData\Local\Temp\oro86pxn.0.vb

                        Filesize

                        262B

                        MD5

                        88cc385da858aaa7057b54eaeb0df718

                        SHA1

                        b108224d4686b5ca3faaeb1c728dfba8740a6eca

                        SHA256

                        08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                        SHA512

                        4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                      • C:\Users\Admin\AppData\Local\Temp\oro86pxn.cmdline

                        Filesize

                        162B

                        MD5

                        ee863645f48e8bf028ea83269ce28c3a

                        SHA1

                        85fd42fdf4c97da417fe21adf0761df327ad343a

                        SHA256

                        be3933d84842c0ec3c0bed0c77b27b569fdb9e6737c8c23323740e0d65a44bbd

                        SHA512

                        45733cb40951eb2b4e0174da5fb225d7d372043058ff7b0fdbec797b02616955d12d5972ff9d9cf6bdf6e358eaea579c6c2a99422bbac3654512458af91b712d

                      • C:\Users\Admin\AppData\Local\Temp\rfjvv1ar.0.vb

                        Filesize

                        290B

                        MD5

                        ce1182df38f7b4c7a89d1e4d1886b0d8

                        SHA1

                        ba5cdc6e13b761912d14ec042639566eebc23eca

                        SHA256

                        e87616f590de6878e0a1051e52bb968d39bad4c7b086cdaecc064c6aa9582e3a

                        SHA512

                        7be8358cbcefde4b1e1a28480eaea0daf5bbbd25aba3d1bd8c589bad3adb63a90551830efabc6e0d2b01a406e41e44c5797502abc88566694fbff7c2091e05a0

                      • C:\Users\Admin\AppData\Local\Temp\rfjvv1ar.cmdline

                        Filesize

                        190B

                        MD5

                        e3d081cbafb7f3cbe8d41cbef111f9c4

                        SHA1

                        0db6bec6845f88730fcfe89cd6ec37e676c4559f

                        SHA256

                        9e66d13c402dfe5ce8c8f0e82c99e8d82983eb7189ef1aaffbd1d71a4802d372

                        SHA512

                        0ae5a7575c8ffbe79fa81c2b20a6504a17f179c5c0eff36f67100332edffb91602bfda92161cff8340100aa43c8b7b6e931aae6655d261305a88e46eda053332

                      • C:\Users\Admin\AppData\Local\Temp\tcz6q4sx.0.vb

                        Filesize

                        266B

                        MD5

                        debab8fb1bbcbf74ca2ac313d4d5aa7d

                        SHA1

                        2a4058378b3df8ef9aa547d1511a425ef043d848

                        SHA256

                        0f1d45b4fd6c36693c7d96bda036a41dccffa4313b92940df6ad180982607744

                        SHA512

                        8beaad01c2f7541532842aca72324eeee7c582d50db2454bab3288dcb2922fdc1f2a0a3e2347a74e744e92c9f8304916c0f52a18754d2e3a5eb2fe6f9fbf6567

                      • C:\Users\Admin\AppData\Local\Temp\tcz6q4sx.cmdline

                        Filesize

                        166B

                        MD5

                        1a8aaa61457f724dbeb2c6252bf00274

                        SHA1

                        4fe8bd472ed1251093521470afcd9607d9b9e49c

                        SHA256

                        f368ad18b563b3b435822680e9100ca953000ba3d68fbb0a0542cc268e2eb258

                        SHA512

                        a5a6ae2b48937a39ed8cf7653ebfb9d4605211dc2eb26f171c2e4dc8a8529343335d4ef0d70795d76346f2e462b15b10172d9c25188f96643c1501a728f41f58

                      • C:\Users\Admin\AppData\Local\Temp\vbcD8E2.tmp

                        Filesize

                        668B

                        MD5

                        3906bddee0286f09007add3cffcaa5d5

                        SHA1

                        0e7ec4da19db060ab3c90b19070d39699561aae2

                        SHA256

                        0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                        SHA512

                        0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                      • C:\Users\Admin\AppData\Local\Temp\vbcD920.tmp

                        Filesize

                        684B

                        MD5

                        41857ef7e71c255abd4d5d2a9174e1a6

                        SHA1

                        95051d6ae43ff1bd9e5ebc95aa2e7b7c3165cb6c

                        SHA256

                        dfcdf12316f3b523895ec611d8e8d9fdc189ab8dde4e86fb962541aeac54e302

                        SHA512

                        ec6c5a7729d273be3ff194ffe47056731ab4100e298b7f50108a2599be59c84bd1953a90c4d7390c477257986a18d336d951f590b782f1aa983de7bd4c86e6ac

                      • C:\Users\Admin\AppData\Local\Temp\vbcD9AC.tmp

                        Filesize

                        684B

                        MD5

                        453916f7e3952d736a473b0e2eea5430

                        SHA1

                        b79ccb2b555a81b8db470ec9fcaea26d42ef1c8b

                        SHA256

                        b0f8b94a35a12060c70e9f81641be22cbf1f1794c73260f48a2e6e46608623fe

                        SHA512

                        86d32a03cf04ef8640075c82e5fecb23034413a41b80b81c900a423b03f44589f774f68f83561465e7c9ce46512c818eef5a90e5ed9f7b3f86b592be34fa367f

                      • C:\Users\Admin\AppData\Local\Temp\vbcD9DB.tmp

                        Filesize

                        700B

                        MD5

                        6ed26221ebae0c285cdced27b4e4dbac

                        SHA1

                        452e9440a9c5b47a4f54aefdde36c08592e17a38

                        SHA256

                        aacdfb10fa949c74577bb1778fe2f3bab88b3e587c07cfffb003e059097e9e6c

                        SHA512

                        c604368a7b4adfbec5b6898c8880ea684bd085d967c1ebd087c9bed065fe3e2575c8298a9ccaa454d68496386667db998e2a04248dda2ab35905c8a9b1135cce

                      • C:\Users\Admin\AppData\Local\Temp\vbcDAC5.tmp

                        Filesize

                        748B

                        MD5

                        b548259248343e12d417d6c938cf8968

                        SHA1

                        19703c388a51a7ff81a3deb6a665212be2e6589a

                        SHA256

                        ab2ce0a14c78f836d2b134a37183b6d89a78b964ea5607940fa5d940d32a0366

                        SHA512

                        73a3902f000a042a448446f6851d6ad61a30bfdfed7d7903b5dad0f368ee43cd6da3b8ba817ac95be1a7427902aba0642af8ccddc4d442867465f1f1f5bf6f81

                      • C:\Users\Admin\AppData\Local\Temp\vbcDB13.tmp

                        Filesize

                        676B

                        MD5

                        ba2c43095c1c82b8024e968d16bee036

                        SHA1

                        41ea006dbc9f0f6e80941d7547a980a1dde868e0

                        SHA256

                        1209067183104b41f03a5be0f377dc1865155cc84bdb509b871b7ce3366aae72

                        SHA512

                        00dc93cdb8c4cb0a681f99d24c59216a721bce963d76bad972e29cf92aafd74e4af46632c00f5aef4ce3160927db9df8aa9a8926ea4a5cb6974b499785569e61

                      • C:\Users\Admin\AppData\Local\Temp\vbcDB52.tmp

                        Filesize

                        644B

                        MD5

                        dac60af34e6b37e2ce48ac2551aee4e7

                        SHA1

                        968c21d77c1f80b3e962d928c35893dbc8f12c09

                        SHA256

                        2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                        SHA512

                        1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                      • C:\Users\Admin\AppData\Local\Temp\vbcDBCE.tmp

                        Filesize

                        684B

                        MD5

                        7a707b422baa7ca0bc8883cbe68961e7

                        SHA1

                        addf3158670a318c3e8e6fdd6d560244b9e8860e

                        SHA256

                        453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                        SHA512

                        81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                      • C:\Users\Admin\AppData\Local\Temp\wshjsq8c.0.vb

                        Filesize

                        271B

                        MD5

                        ac972015bef75b540eb33503d6e28cc2

                        SHA1

                        5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                        SHA256

                        fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                        SHA512

                        36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                      • C:\Users\Admin\AppData\Local\Temp\wshjsq8c.cmdline

                        Filesize

                        171B

                        MD5

                        8e0474483de877125fc87381cdea61e6

                        SHA1

                        5c1005da12d19ea4c2356685fe8807446fd0778e

                        SHA256

                        5d06d9ea4d4a7d87733529a0a900d7e2b14b219eddfef2de3b57407fd679c53a

                        SHA512

                        867699f784d76c12cf025bcfd79d953087a409a7ad170b7fd40c78b681b075b616fd1de2f88100cff94c47c536ff200202fe299562e0c9b12ac584f01b8d5894

                      • C:\Users\Admin\AppData\Local\Temp\z0ljfmdu.0.vb

                        Filesize

                        273B

                        MD5

                        3c3d3136aa9f1b87290839a1d26ad07a

                        SHA1

                        005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                        SHA256

                        5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                        SHA512

                        fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                      • C:\Users\Admin\AppData\Local\Temp\z0ljfmdu.cmdline

                        Filesize

                        173B

                        MD5

                        a6feed5c5eded530b464f9a31dfcc329

                        SHA1

                        b2efef4740e89d9f0d6e3179ceb17c13348a45e9

                        SHA256

                        6c589c732a1ee6cbcd583778c24518b35d63d2944eba95992fbe8848ba884e52

                        SHA512

                        f1c7d3f2268a5a66ce6e49de0e7e84266772f7ae71431a31a948b9bb6e099aaa64abe8241160d137e1a86dbc7328d273e06118bb6ebbd45148686052b663b30c

                      • C:\Windows\System32\MSSCS.exe

                        Filesize

                        21KB

                        MD5

                        6fe3fb85216045fdf8186429c27458a7

                        SHA1

                        ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                        SHA256

                        905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                        SHA512

                        d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                      • memory/1740-3-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/1740-4-0x000007FEF5E4E000-0x000007FEF5E4F000-memory.dmp

                        Filesize

                        4KB

                      • memory/1740-13-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/1740-0-0x000007FEF5E4E000-0x000007FEF5E4F000-memory.dmp

                        Filesize

                        4KB

                      • memory/1740-2-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/1740-1-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2328-22-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2328-23-0x0000000001F00000-0x0000000001F08000-memory.dmp

                        Filesize

                        32KB

                      • memory/2900-12-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2900-14-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2900-15-0x000007FEF5B90000-0x000007FEF652D000-memory.dmp

                        Filesize

                        9.6MB