Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2024 07:08

General

  • Target

    68ce3565bb806ee7bbda7256c0270333f069f6677850c9ec2511404602643f1c.exe

  • Size

    3.6MB

  • MD5

    559a0f99f9f896e2c54a8e565592966b

  • SHA1

    0cd2f8dcfe72649b04c1508aa900cfd4f8f13460

  • SHA256

    68ce3565bb806ee7bbda7256c0270333f069f6677850c9ec2511404602643f1c

  • SHA512

    6349d566f1df3eace2975b193cab125e54480a0e145e456e8972c25de412458d0380d6d79630d7fffb9d6112dfa1d6669550d26dae61884b08da1e283248d7cb

  • SSDEEP

    98304:7Y323PnLFoz1zTLE/J8WySsKBmeEMLM2yTP+OXwacX:2QPLS2yjKMCMxb7ghX

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Drops startup file 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\68ce3565bb806ee7bbda7256c0270333f069f6677850c9ec2511404602643f1c.exe
    "C:\Users\Admin\AppData\Local\Temp\68ce3565bb806ee7bbda7256c0270333f069f6677850c9ec2511404602643f1c.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Users\Admin\Documents\taskngr.exe
      "C:\Users\Admin\Documents\taskngr.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0w5mnr-4.cmdline"
        3⤵
        • Drops startup file
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD367.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD366.tmp"
          4⤵
            PID:2420
        • C:\Windows\system32\schtasks.exe
          schtasks /create /sc minute /mo 1 /tn "WindowsTable" /tr "C:\Users\Admin\Documents\taskngr.exe"
          3⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1388
        • C:\Users\Admin\AppData\Local\Temp\6993793.exe
          "C:\Users\Admin\AppData\Local\Temp\6993793.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1992
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qaocnnec.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1552
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD5F6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD5F5.tmp"
            4⤵
              PID:1620
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wfnk2c8l.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1744
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD6D0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD6CF.tmp"
              4⤵
                PID:2480
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yujljm65.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2844
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD73D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD73C.tmp"
                4⤵
                  PID:2812
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sstf5l1c.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1440
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD76C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD76B.tmp"
                  4⤵
                    PID:3060
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hhjmko0j.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1632
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7E9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD7E8.tmp"
                    4⤵
                      PID:1592
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ecd_ztsy.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:840
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD847.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD846.tmp"
                      4⤵
                        PID:1648
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\au6xsg9-.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1612
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD895.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD894.tmp"
                        4⤵
                          PID:536
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\7f46t_1q.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3032
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD8D3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD8D2.tmp"
                          4⤵
                            PID:1448
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\45fyliov.cmdline"
                          3⤵
                            PID:988
                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD902.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD901.tmp"
                              4⤵
                                PID:3028
                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jg6w-ybi.cmdline"
                              3⤵
                                PID:1976
                                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD950.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD94F.tmp"
                                  4⤵
                                    PID:2300
                            • C:\Windows\system32\taskeng.exe
                              taskeng.exe {48075ED9-2E5E-4444-B8F2-B92E023B3EDB} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]
                              1⤵
                                PID:2152
                                • C:\Users\Admin\Documents\taskngr.exe
                                  C:\Users\Admin\Documents\taskngr.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2536

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Users\Admin\AppData\Local\Temp\0w5mnr-4.0.vb

                                Filesize

                                146B

                                MD5

                                cdaa26fe88bf2e9296843cac186f0f8a

                                SHA1

                                a8f9769fe277bfc5e2dd2f9c3db2921020cafe10

                                SHA256

                                5e610bb330f79e0ebfa2078f9d408db2e4f4e8c4e644057183419f40ab7736ed

                                SHA512

                                df18dd6e421bd9f18445b1c50aacd651956f44939249aaee9a1078855329ca0e7e92965da9b059555f55901c49e81b400e755111bc7d360e75dbf658872a4d6a

                              • C:\Users\Admin\AppData\Local\Temp\0w5mnr-4.cmdline

                                Filesize

                                210B

                                MD5

                                4add44af5559deb45cf3498f4b658190

                                SHA1

                                392d574f6cf21a743d68e42bd840e88845de0e70

                                SHA256

                                253fbcd13f8bb40d54d5f400d7dde48bef8196ecd7b8e3655e20a3e18c6a7b7d

                                SHA512

                                27beca3449704cde3b1bf5451a9cc782ffb5f5541b284f0e228ced22d179c2418f152957cd12ace2e1600bfb5bf5efbaac2a29b7e6077852e58e46c9977cc42c

                              • C:\Users\Admin\AppData\Local\Temp\45fyliov.0.vb

                                Filesize

                                285B

                                MD5

                                36dec6c894af5ba982846e27dce1da21

                                SHA1

                                553bf67b97d9150b99ccd8e950c381f21dd4a43c

                                SHA256

                                7a9414b12f9628abf0a42999e4c954ec5151f719ec34812a7b18824e7994ffec

                                SHA512

                                821d6c5f565761f837bc97b94830a7d55bb6796ba531078195ebaaeee6b050d88a8e97fb45138277ae3d09da3c8ae36d28a80643425c57e69afc28222b01b1fe

                              • C:\Users\Admin\AppData\Local\Temp\45fyliov.cmdline

                                Filesize

                                170B

                                MD5

                                9a3fe8e4fb9832f45c6828f90c6e83fc

                                SHA1

                                3bab1925345c3aefec9253b685038b6fc5c3ef02

                                SHA256

                                88a2ae24055816a39e62a54a000ed2beaeb5ccc9ad9c350e38313d6480a04d38

                                SHA512

                                5c6d2fb1d9c196fac7d76cdb2f52ae8ec9ed286216cee62ee9bf7f405282ecbf762cff1c7389e7218922bf8c427ece15a04aa23a75220a1350bb1017dbcb7185

                              • C:\Users\Admin\AppData\Local\Temp\6993793.exe

                                Filesize

                                1.9MB

                                MD5

                                c4394fb4daaf350cdbf5303d812e917e

                                SHA1

                                6a780c9f1c15e555b72640299b9c10e7927252f6

                                SHA256

                                0ac3387b6e0283c972722c2a6664ee23ac5ba10640d18b827e8732f5c57e7d2c

                                SHA512

                                585664a31ac2131efde439468f98c53423588348019edb3c767ffc9bb6a8a881959fd1f4a30d623a0e6a4cc02d180a146b37bef8679b55b111f46d2fb8fb82e1

                              • C:\Users\Admin\AppData\Local\Temp\7f46t_1q.0.vb

                                Filesize

                                279B

                                MD5

                                f7414480c14ed927b96983a454b45ad4

                                SHA1

                                f0b9701777b2643e03165a5e3932fab15fa054bf

                                SHA256

                                21344d6b94d6f9460b875f7120934f8a230418719f6b6951baf423c6244e6fd8

                                SHA512

                                645a18383cea2f1107b2d0dda0c04b059f0385fc77a6da837a9bd180df410fc34534df4f595d766b030cfae3c9c696e2400a6d4abd0852e6a2120e1859876145

                              • C:\Users\Admin\AppData\Local\Temp\7f46t_1q.cmdline

                                Filesize

                                164B

                                MD5

                                869dfb31c9d8d55bcb589706083491ec

                                SHA1

                                8b5cd78328ec1532aceffb93b54fab62312938a2

                                SHA256

                                489213bbfff5166a7f434f10d93bd2f29506c804c5f93b5692bda8b2878aa742

                                SHA512

                                eb49dae868ece19e9f98a23fbca72c76c53c47a6c294410d280b36d41b15597a7293078b26b01c601fa482a8f85681e140850fc893e0ffd5302e37dd2b2c7ab3

                              • C:\Users\Admin\AppData\Local\Temp\RESD367.tmp

                                Filesize

                                1KB

                                MD5

                                8948b8e2a10a295878ab7f6bf38d92b6

                                SHA1

                                3a293d414b49565be2b83f4bfe3bea4c37c9d070

                                SHA256

                                f4296ede1229e6fe21a17d67eb3ad656934beed14d66f391e5c8bcedef108df0

                                SHA512

                                2d57070dc7f8053c99fc21d7e0501c7daeb2c3fbeac649be9a2ffe93efc31d386b391651a8f62f9dd94984d08562f84b194801a55e917510e26f1b61b2b881a3

                              • C:\Users\Admin\AppData\Local\Temp\RESD5F6.tmp

                                Filesize

                                1KB

                                MD5

                                c1041c0c25ae5496f2d055c36d5b9ea2

                                SHA1

                                bad43e60b3bc393c5fc7812299996425b8fa1561

                                SHA256

                                43dd383b08adc5dbdf94536aea38abe9b65348f454210452ce0cca010ff50890

                                SHA512

                                e12ffdb59f5901e31809c9198dc21bf33e5730668400f46f0b031b18b7aa7ec34deaa76d186fd03c8721ad1f2c31c0b5321cf7c58c09b2050758a2747d7130eb

                              • C:\Users\Admin\AppData\Local\Temp\RESD6D0.tmp

                                Filesize

                                1KB

                                MD5

                                31dc28b293c273f56edb755585647719

                                SHA1

                                1736e5e8e83a765826625b7561dd55fdc70aba3d

                                SHA256

                                99a579f1496d50f021de613c09a1c0d6afcac9871e0457c93d87d71e473c4094

                                SHA512

                                1c40f951628cda10ae993a371216645d160f851b3302e771ee50249f95cb6cf420aecd9ad07847a6fb84b5aca45e6107f139c0b4d8aace9b1411719cb4a9df0e

                              • C:\Users\Admin\AppData\Local\Temp\RESD73D.tmp

                                Filesize

                                1KB

                                MD5

                                4f8776fe4fa896fe330fac51827104ef

                                SHA1

                                b7bd41cbc08d2dc7008b75a84ae645ae3ace60b3

                                SHA256

                                61ae6e14f3de276658e2609cc746be6f22856f4f1bc3ab94565caed0c023c6ac

                                SHA512

                                a2414acd7facecfd1e37365c14037377500a00baae948c28c5a1db8a1235046c70ef6e9dbc03e19dca1abc07ca234dcc5d12cb9679c10b71a38232de0ce600c1

                              • C:\Users\Admin\AppData\Local\Temp\RESD76C.tmp

                                Filesize

                                1KB

                                MD5

                                26555ddb9e928d88d862f2a594ee3baf

                                SHA1

                                74956c58b945cefa71d069a8909efc9c6e1b95d0

                                SHA256

                                48a599a1f81c065f9dcd7a7497c9b8fb653a63b8023bd978d05e35d9b2949275

                                SHA512

                                b6198c071ea4bac409994e8bddfea2e27471e253529fa3d3c2ae77e73076131fc7c5cbc4d104eb02140b5fa63e4efff577de049ac6df1e6f3961f0224f2088b8

                              • C:\Users\Admin\AppData\Local\Temp\RESD7E9.tmp

                                Filesize

                                1KB

                                MD5

                                b5453caa042535b3546c1e1d4cb8f403

                                SHA1

                                eddb263f91fccf3a94f4c2bb3d45e47571882825

                                SHA256

                                34bca77b343ba12c13dbe5bfecba445dfe23df11582ea15377c4c91b6245a453

                                SHA512

                                e325dd0a28da6048b174657527c9fb7634d348740b0afa937b3ad00b5d9f61b3845a2d9efe3163944e69a80a8f9cdf655e3506da6a322041229d4dcb93b33991

                              • C:\Users\Admin\AppData\Local\Temp\RESD847.tmp

                                Filesize

                                1KB

                                MD5

                                1997cc3c75983f18cdba228e279e10ee

                                SHA1

                                dc839011d30612cbd65ffd3bbf27254c5c249c94

                                SHA256

                                06ea7104fc226dd948e676d9507e39efb3bb9f0dbc7c2877ee6d438dc627adc3

                                SHA512

                                c0000255ec87080ae1f5979619a4451307009e077e5f8efbcdbfd587434d33795bf203a7a2c20f1295e9dd6343fc33d5806b72eadfe2faa9365360176b029722

                              • C:\Users\Admin\AppData\Local\Temp\RESD895.tmp

                                Filesize

                                1KB

                                MD5

                                4757eb98da71e5ba89135b0e7957f6d3

                                SHA1

                                fbe5cdb9f91248aa63a127c5fe0867b5755bffb8

                                SHA256

                                420aef9ccdb53dd86f342361acaa5dce6290f206e1c9c6f52b8485b42a1fe629

                                SHA512

                                3ad2973773c65e217c2439a17f2f6dcdb32ae7369e7c4e857b99b9fdea390fa712dce3a863824469c0e1fe7865f4794691d94d672a09a7384c4df1a443cb1a5a

                              • C:\Users\Admin\AppData\Local\Temp\RESD8D3.tmp

                                Filesize

                                1KB

                                MD5

                                2df1220c653a4bf264e1ca6ab70ad772

                                SHA1

                                75d7ea190481bb765f980db60866b9cd3fe3bc78

                                SHA256

                                bf97691ed406a06497fecb0f49a671912fab0048a1f0e6357b7928eaf532041f

                                SHA512

                                096f7618b1d9f90d6be1c8f6c4a73b0b4bcb905b487a57ee1697defb584c49b94e27a1bb9696908928d75e2dc9638eae78eeb6e3513400c4a22a181c11b06fe2

                              • C:\Users\Admin\AppData\Local\Temp\RESD902.tmp

                                Filesize

                                1KB

                                MD5

                                d906d9afeb79e02a6064de9454f9e0a8

                                SHA1

                                2cf91c4db75335dc2b46cc4731feb3357fb427a0

                                SHA256

                                3f3b236e706f7262a7a2d3748ea2b42b5af95bab70a0bd15a1c0d6dc84d1397a

                                SHA512

                                becd7d7f0a7b9052f9ca61c6853dcebd463461d8472039fc82e98eabb372a661c5dc7112ec2ee52ea3667492b99f71df05687a609aafe450360f2b287f025635

                              • C:\Users\Admin\AppData\Local\Temp\RESD950.tmp

                                Filesize

                                1KB

                                MD5

                                b24e9d4492238d8caa3297159aae7970

                                SHA1

                                5c127f01fb6ebeffc34a54ca29235863e2e7c7bb

                                SHA256

                                fd83082e04349e95b7120606637650cfc0c8d9320f07caf40951c78c0e77778e

                                SHA512

                                28a156f73586e620e7bf30117a201d92f49df3440bdc5f1cffb11d16416203d2a3ec49249ffa29acb953730a1c68817201f8b281362780f010486d37eca36068

                              • C:\Users\Admin\AppData\Local\Temp\au6xsg9-.0.vb

                                Filesize

                                286B

                                MD5

                                8783af5be5e9776ee12c9010b4b9977c

                                SHA1

                                0f01d056c8849febe9df881b6c39feb2dcc71b4a

                                SHA256

                                54418c6208b45725541438f67a4c5e4e073400dbdc8ecb5f61f05556565ed470

                                SHA512

                                4d509e3d8f7d7dc0650b220b51b175707c1ebe8dd59c9b3dfb9bc456ccbe77c99d403e6d05ad80f768b1774b58c56a75cf0921d919c457209118e4330da5bb84

                              • C:\Users\Admin\AppData\Local\Temp\au6xsg9-.cmdline

                                Filesize

                                171B

                                MD5

                                e7708adea65fbdb260f967eba5eaef4f

                                SHA1

                                b2acd586877a086b2d3de735f93653c36717cefc

                                SHA256

                                1f364ba04fd969904d399a990b0204dfa257da3b6cc50da0c30d20d2158a820c

                                SHA512

                                f8f4b35563169365643004df132676b7d7a23439316ab784a48c1389e5d38f1429eb4d7a6913919944677866a44521a540fe1f5906c625c6e9ba4eb4c984f082

                              • C:\Users\Admin\AppData\Local\Temp\ecd_ztsy.0.vb

                                Filesize

                                305B

                                MD5

                                6f6f5637206f90c85203bd18d3194b66

                                SHA1

                                8dd722b515585763b3d795928687e829c4abd991

                                SHA256

                                4fdf26524083ba5a5226697dd84afae3718ad7bc1233e520ac1338ae486e58ce

                                SHA512

                                1e6dcc7084a536c597dfba00a5fa5febd6831b4a0c8ec0621f8f41c5f15cdad947e67676ff962f02c887506dfdaa50381b3c3d1ce0a32490f8e1a2ef6f819e08

                              • C:\Users\Admin\AppData\Local\Temp\ecd_ztsy.cmdline

                                Filesize

                                190B

                                MD5

                                aee165a115a4593c560e1b7523a8d748

                                SHA1

                                7c2f9757eb44caf9f3bc471cd2268822470213f6

                                SHA256

                                7098bcda8a0a3f6287cd8b10d3b745cdadc7a07e2b8121f5caae15316cfd4a4a

                                SHA512

                                61f5ea92aa286ffddf50211d96309c61bc4d6dbb2d60f8261ee18f8a7c3fb731c91466b69e17db59f5a04de644f8c09b51d0d67065fbf49547ed3f34cb3456bd

                              • C:\Users\Admin\AppData\Local\Temp\hhjmko0j.0.vb

                                Filesize

                                286B

                                MD5

                                d7e819e5c304049739e7f2a9e6b58c70

                                SHA1

                                fda2f4074c92a643c5784d3f1f873e95e08aad94

                                SHA256

                                9203d9523aa99b6d117664d6dd5e7400b9db5d0b637d961687ed5cefba4585b5

                                SHA512

                                c86b23c403736baaa8158dad0fb2b60d04632a5a293518a0f99c1c9c548aac20dea0791082b477f2eedbd89ca10257347794b3236ba24c08628535ef79776389

                              • C:\Users\Admin\AppData\Local\Temp\hhjmko0j.cmdline

                                Filesize

                                171B

                                MD5

                                52436b38b289ddc3113a803b000c1aa4

                                SHA1

                                fd246e8262967a7e1d2566c9b819046ea8d81ddf

                                SHA256

                                21317e4b8e34c03ca39bfdcc32ff0096b6fac5c27ffe594ef8e4a7c9aa74ee67

                                SHA512

                                4e2035c3babfd3938156da6c6f4126149c72420f4244462921515471ca35d0057b7a0622174432768ec5c62e4cbf32f6a9447ef212b4f0e8515e10b3392b3d9b

                              • C:\Users\Admin\AppData\Local\Temp\jg6w-ybi.0.vb

                                Filesize

                                288B

                                MD5

                                d2bbf198a5efe2d0c53eb7302c6b2a25

                                SHA1

                                adf8a6092bcde5738aea72861cbdd90409c6f3ee

                                SHA256

                                44a8b749b445cbf5e18647d40d430113341c37c5ab943f3287dd9660e5052a62

                                SHA512

                                bcecf3e7ae6c12e412136b740024824a8f8d13c5e897822b7a8ba5ea7171a6336f1e3621d6e1c35cf341c849523ac7f008c50093614369d610fbde1b7739213b

                              • C:\Users\Admin\AppData\Local\Temp\jg6w-ybi.cmdline

                                Filesize

                                173B

                                MD5

                                030b5dfad3d3b6dfcfe7c1f45597b5a6

                                SHA1

                                add00ba9b930a6306aa53fab08d10dc9f1b60bf9

                                SHA256

                                64131692ee49083ea9a829ac4c715d28d4c5c53fb3557443e353aae847553a4a

                                SHA512

                                1303e3adcde3015f55e0883b8ab1ddc67dfd1d49419fc2cb4e68fa008f6fb972929bc2c01d1f00de4299b3daa23c2270f4bfbea5bbaa1953f3dc973e7e264114

                              • C:\Users\Admin\AppData\Local\Temp\qaocnnec.0.vb

                                Filesize

                                277B

                                MD5

                                e5761189550be412d3d6f7251a2b5da4

                                SHA1

                                14667e3906bd1f52416e5d3b0857a7fc3bdeabad

                                SHA256

                                eb3bb3a3e609603c7391d28e05a6c2c63a7b863730cc1a577cae7a6d46a31eb4

                                SHA512

                                1c4f974158a5536b862d5cda56079001626809fd1655cb74daccd93edf2bb83becc69d92737732c893fb8541350896e1642f98355359622af17c9562c7f77355

                              • C:\Users\Admin\AppData\Local\Temp\qaocnnec.cmdline

                                Filesize

                                162B

                                MD5

                                82a6b6ad4bcd4dfbaf0d6d3e910170f4

                                SHA1

                                4016a7fb3252614282d7359345fdc592b52a9fa9

                                SHA256

                                7201e2955bbdb3cb547f49d243b879aa8f6858f740edf9d3e8693b56741a4827

                                SHA512

                                1f8f79eec8b6dc8212a56e1b0b0ad66e933ea17a20ea70657cd0959c81db50bd7a9c63ead8d969c36862f002e1c2baf720725d74665694a558ec47395111e66a

                              • C:\Users\Admin\AppData\Local\Temp\sstf5l1c.0.vb

                                Filesize

                                284B

                                MD5

                                74735a9370caa035718311e0de3a4601

                                SHA1

                                cbeb19a5f0fdec056b787ba3daa23b48fb323f04

                                SHA256

                                4c0dfb5527c7a63fe7a033d83e2e1a42085a361d2eaf8fe581708f4fa6ec2590

                                SHA512

                                2b240a0fc2ddba3182449a41b70a5b3cf13b88ea14574f7b070bf279d89e107857aca641ba07c09774ac6ff9cfec5e6bcca0efb1ac5dcfacfaf0847eff17911b

                              • C:\Users\Admin\AppData\Local\Temp\sstf5l1c.cmdline

                                Filesize

                                169B

                                MD5

                                51362964dfd4c93cb324a23e6f43bce2

                                SHA1

                                7fbed56d411e26948f6691561830f19eeea97858

                                SHA256

                                f1897ebfe44d61226be8657046633fc3581598c5b7b0b45e6d5e41eed7833a54

                                SHA512

                                39c5649a33380f99b36df1c44326ca34ebdad213cd824ca870fd47b466dd798c5930d8581c94683e94e3978227911eeb31c422a771ec990a52a445ffb4ef5a49

                              • C:\Users\Admin\AppData\Local\Temp\vbcD366.tmp

                                Filesize

                                708B

                                MD5

                                253ac3eb8d80354190d7be9278727b6b

                                SHA1

                                bba447681cb11f36c316a2ae223fc94e056e66bb

                                SHA256

                                2cff523b286303dd0773ace801595a2bdca962861d59b620bdd953f966655251

                                SHA512

                                eb5bc537fcd1fb4713d51662d75993646fb8c2684f1bb0078fee3697c271650d1498fd1c201f2bd9759b0e18239627d72e1a46c141655fe7b4919e0cbe871bf5

                              • C:\Users\Admin\AppData\Local\Temp\vbcD5F5.tmp

                                Filesize

                                668B

                                MD5

                                3906bddee0286f09007add3cffcaa5d5

                                SHA1

                                0e7ec4da19db060ab3c90b19070d39699561aae2

                                SHA256

                                0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                                SHA512

                                0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                              • C:\Users\Admin\AppData\Local\Temp\vbcD6CF.tmp

                                Filesize

                                684B

                                MD5

                                41857ef7e71c255abd4d5d2a9174e1a6

                                SHA1

                                95051d6ae43ff1bd9e5ebc95aa2e7b7c3165cb6c

                                SHA256

                                dfcdf12316f3b523895ec611d8e8d9fdc189ab8dde4e86fb962541aeac54e302

                                SHA512

                                ec6c5a7729d273be3ff194ffe47056731ab4100e298b7f50108a2599be59c84bd1953a90c4d7390c477257986a18d336d951f590b782f1aa983de7bd4c86e6ac

                              • C:\Users\Admin\AppData\Local\Temp\vbcD73C.tmp

                                Filesize

                                684B

                                MD5

                                453916f7e3952d736a473b0e2eea5430

                                SHA1

                                b79ccb2b555a81b8db470ec9fcaea26d42ef1c8b

                                SHA256

                                b0f8b94a35a12060c70e9f81641be22cbf1f1794c73260f48a2e6e46608623fe

                                SHA512

                                86d32a03cf04ef8640075c82e5fecb23034413a41b80b81c900a423b03f44589f774f68f83561465e7c9ce46512c818eef5a90e5ed9f7b3f86b592be34fa367f

                              • C:\Users\Admin\AppData\Local\Temp\vbcD76B.tmp

                                Filesize

                                700B

                                MD5

                                6ed26221ebae0c285cdced27b4e4dbac

                                SHA1

                                452e9440a9c5b47a4f54aefdde36c08592e17a38

                                SHA256

                                aacdfb10fa949c74577bb1778fe2f3bab88b3e587c07cfffb003e059097e9e6c

                                SHA512

                                c604368a7b4adfbec5b6898c8880ea684bd085d967c1ebd087c9bed065fe3e2575c8298a9ccaa454d68496386667db998e2a04248dda2ab35905c8a9b1135cce

                              • C:\Users\Admin\AppData\Local\Temp\vbcD846.tmp

                                Filesize

                                748B

                                MD5

                                b548259248343e12d417d6c938cf8968

                                SHA1

                                19703c388a51a7ff81a3deb6a665212be2e6589a

                                SHA256

                                ab2ce0a14c78f836d2b134a37183b6d89a78b964ea5607940fa5d940d32a0366

                                SHA512

                                73a3902f000a042a448446f6851d6ad61a30bfdfed7d7903b5dad0f368ee43cd6da3b8ba817ac95be1a7427902aba0642af8ccddc4d442867465f1f1f5bf6f81

                              • C:\Users\Admin\AppData\Local\Temp\vbcD894.tmp

                                Filesize

                                676B

                                MD5

                                ba2c43095c1c82b8024e968d16bee036

                                SHA1

                                41ea006dbc9f0f6e80941d7547a980a1dde868e0

                                SHA256

                                1209067183104b41f03a5be0f377dc1865155cc84bdb509b871b7ce3366aae72

                                SHA512

                                00dc93cdb8c4cb0a681f99d24c59216a721bce963d76bad972e29cf92aafd74e4af46632c00f5aef4ce3160927db9df8aa9a8926ea4a5cb6974b499785569e61

                              • C:\Users\Admin\AppData\Local\Temp\vbcD8D2.tmp

                                Filesize

                                644B

                                MD5

                                dac60af34e6b37e2ce48ac2551aee4e7

                                SHA1

                                968c21d77c1f80b3e962d928c35893dbc8f12c09

                                SHA256

                                2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                                SHA512

                                1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                              • C:\Users\Admin\AppData\Local\Temp\vbcD94F.tmp

                                Filesize

                                684B

                                MD5

                                7a707b422baa7ca0bc8883cbe68961e7

                                SHA1

                                addf3158670a318c3e8e6fdd6d560244b9e8860e

                                SHA256

                                453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                                SHA512

                                81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                              • C:\Users\Admin\AppData\Local\Temp\wfnk2c8l.0.vb

                                Filesize

                                281B

                                MD5

                                b73a59a72b7d941a67dc09be6a018494

                                SHA1

                                4b9d51f84ea99886b0871857b429842901f75ec5

                                SHA256

                                50e4b4c85690614f0273f0bf0bc78cb58788e4cba5edf0f43342435ba73feb79

                                SHA512

                                87cdffd169268497f3442949fb15dc3bd94d81c8b453cb454c5dd3b0d84a8ea4f04853c5a34cc8f1e8b4d4962ea6948d0b7909375e7ae793648e9205ac7ff9b6

                              • C:\Users\Admin\AppData\Local\Temp\wfnk2c8l.cmdline

                                Filesize

                                166B

                                MD5

                                7c050130aa0741e7d98e13c31f519ed7

                                SHA1

                                17c3c6e3e497bc2d23a32194ba64f489e0341068

                                SHA256

                                3ba0b6a93152c6d813b7444b2967fb6857bc77e891b72bb37669c9520534dee7

                                SHA512

                                f8eb176422d9e7a5d7fa2a4d2ef63c26d43a302e2c67305240c5a13757bd38c9294e474fa840c55e2dd841fdd0f66fbcfee56a6599f9c4450c918cb65665e025

                              • C:\Users\Admin\AppData\Local\Temp\yujljm65.0.vb

                                Filesize

                                280B

                                MD5

                                1c653b72085eba814ec06e0b6dbc2d44

                                SHA1

                                21793bd5eec422ae8c4ec2c2dd04558b5d758fc7

                                SHA256

                                c5ec4a5c4a050be6528774688bdca002af01d1c74b3f8271840718177087b1a2

                                SHA512

                                8098b07147423a65d64e3058fd3a6ca9d4bb7408bbbdffa4b4fe7fb4be04f87fbc3aa11ead81d8a9d992aec15bb760372c753d79efee55e31f66636c4128b736

                              • C:\Users\Admin\AppData\Local\Temp\yujljm65.cmdline

                                Filesize

                                165B

                                MD5

                                a7c1e7a0f54ed1ecc58f170afb93ed3d

                                SHA1

                                c54cd88461c116d371170f93fa4493efd75ce26d

                                SHA256

                                c70dd3254c71de34f5b1350a057b98faf3617c9e6951270aa42d92e0dd59a67a

                                SHA512

                                a9dacaec987d53f9ace1e48d626680528faa6f99ab5bd2f0bf2270ce22aa81c9b12d17916851c602dae436b5e89e924d1c39ce9dd33046200f5e5e81f167ed6e

                              • C:\Users\Admin\Documents\taskngr.exe

                                Filesize

                                3.6MB

                                MD5

                                559a0f99f9f896e2c54a8e565592966b

                                SHA1

                                0cd2f8dcfe72649b04c1508aa900cfd4f8f13460

                                SHA256

                                68ce3565bb806ee7bbda7256c0270333f069f6677850c9ec2511404602643f1c

                                SHA512

                                6349d566f1df3eace2975b193cab125e54480a0e145e456e8972c25de412458d0380d6d79630d7fffb9d6112dfa1d6669550d26dae61884b08da1e283248d7cb

                              • memory/776-12-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/776-4-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/776-3-0x000007FEF5D2E000-0x000007FEF5D2F000-memory.dmp

                                Filesize

                                4KB

                              • memory/776-2-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/776-0-0x000007FEF5D2E000-0x000007FEF5D2F000-memory.dmp

                                Filesize

                                4KB

                              • memory/776-1-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/1992-53-0x0000000001140000-0x000000000132A000-memory.dmp

                                Filesize

                                1.9MB

                              • memory/2408-13-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/2408-14-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

                                Filesize

                                9.6MB

                              • memory/2408-15-0x000007FEF5A70000-0x000007FEF640D000-memory.dmp

                                Filesize

                                9.6MB