Resubmissions

14-12-2024 07:51

241214-jqcj1sxnhr 10

11-12-2024 15:39

241211-s3498stkar 10

07-12-2024 20:12

241207-yy4qsswqej 10

04-12-2024 19:31

241204-x8wmhaxmcv 10

04-12-2024 11:47

241204-nybd5szkdq 10

04-12-2024 11:40

241204-nsybqazjek 10

04-12-2024 11:35

241204-np1bxatqgz 10

Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-12-2024 07:51

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4836
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4632
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3068
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\s3ixbijc.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3112
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE6A2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC9F7E1CF9E2546388A51B21DBF71B71C.TMP"
          4⤵
            PID:2384
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\aprhqrup.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3080
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE75D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCE5E5495FFEC4A25BE527C53A3AAED7.TMP"
            4⤵
              PID:1340
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ww5y6lqa.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4324
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE7FA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc607812CAEA524B398D47826BCD3153E0.TMP"
              4⤵
                PID:4492
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ro-eywli.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2360
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE877.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1D97D17091EF40FDB362D0301443C33D.TMP"
                4⤵
                  PID:4792
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\7tkhpnbh.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:516
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE8D4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCA61F6A28A1548B6A1FF6315757268B9.TMP"
                  4⤵
                    PID:5060
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a82lia1o.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2680
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE942.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc49697A09676848519ED261215FA81614.TMP"
                    4⤵
                      PID:4704
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qgfeewhu.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2888
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE9AF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6BE538EA271A4726A0E04CF8E593B3E1.TMP"
                      4⤵
                        PID:3856
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sfouhrs8.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:396
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEA2C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB723B733F2B74E40A449397D8CB3F74F.TMP"
                        4⤵
                          PID:5020
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ntp9t24b.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2160
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEA8A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc8E0BEBEDC05B434D9683282E6F68954.TMP"
                          4⤵
                            PID:3924
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ldlpf9la.cmdline"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1320
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEAE8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC3305F5D5C8C4E608B6B96991FEEDB3.TMP"
                            4⤵
                              PID:4640

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\7tkhpnbh.0.vb

                        Filesize

                        272B

                        MD5

                        2b3aac520562a93ebef6a5905d4765c9

                        SHA1

                        10ab45c5d73934b16fac5e30bf22f17d3e0810c8

                        SHA256

                        b9f0edf067faaaa7da2d47e3d22b957cd302eb25e01e08ea79c664868f328f89

                        SHA512

                        9514934ed12d93ea3ad4e6873cf294bafa114bc7a784a93b14dd2410d07fae3a2c00308035a5c129c57e283de8b94ed36fd9f9de35b08eb79a82a0c732e50446

                      • C:\Users\Admin\AppData\Local\Temp\7tkhpnbh.cmdline

                        Filesize

                        172B

                        MD5

                        b6c7dd9f7a5e004a411242d1d8058244

                        SHA1

                        e514437fced59343650dde82f46d4d8559904cc8

                        SHA256

                        d47a3d901745729b878e395609bb18030ec62653d7a436704f3cfa4065a895ee

                        SHA512

                        3a98c1114b2baa465c1c8d1511776c6bb4fba4f9af0d1ad6b26e7aba317a0b1e43b537ce2c476dcbdbc0fa514e216e65ff7f40c8061afd49c926ff5bc0e0137c

                      • C:\Users\Admin\AppData\Local\Temp\RESE6A2.tmp

                        Filesize

                        1KB

                        MD5

                        8d25e0ece358a3dadb3d0fb36c9add00

                        SHA1

                        68f4935e2976c151b4b3e2d243cb2fd2dd76c520

                        SHA256

                        369f345fd7a03bf5f7d9299c2c0e137c7d5bb7519fcf0a39e07ea156df7452ce

                        SHA512

                        764d09d0e29b156ab6566816502990ea0381c016bf81d579f00a34cdfea5b2f9442820f81614b2ee23898236e1cab9db4c649514f73f834208b46a8449fed333

                      • C:\Users\Admin\AppData\Local\Temp\RESE75D.tmp

                        Filesize

                        1KB

                        MD5

                        cd2563e8ef60359a049ac8a2467cfa19

                        SHA1

                        693413e114f9c63998bdac51a3f751f3c26fbe27

                        SHA256

                        985df926800c154095ec0ccc14bea319b1dfd58247c1a72600bfed9af8fcd53f

                        SHA512

                        301e80263de34ee6331a76411b37f9f2e2f396aebca9294ef6ccc42786db1931b13c2484d57d7ff5d82d12bf908049a2a21ab6aa6d92217921dd4f0d70353c48

                      • C:\Users\Admin\AppData\Local\Temp\RESE7FA.tmp

                        Filesize

                        1KB

                        MD5

                        3358d239c0b89c02d2138d900df0b3db

                        SHA1

                        2c40110219dd17cd713e00786e8ec9823f3fea12

                        SHA256

                        193764006f97beff82ae6128b309bf18a0015e7d4e947d6f494e1e5e5cdb2497

                        SHA512

                        655150a3193af3b18a8d652e32260163593bd0a8554e91fb9bfe6c7e647c0f2eeae71a8942e976758296684455d63152615c28c27e3951c91cadadbdae8684ff

                      • C:\Users\Admin\AppData\Local\Temp\RESE877.tmp

                        Filesize

                        1KB

                        MD5

                        2f82811cba6a094b9946030b31c54266

                        SHA1

                        44ffd1a2be9e049476afd8685be615eeb5302647

                        SHA256

                        3415003abe9deb828fc1035f62fc457ae17156ac6e1a149e4181bb199b560b49

                        SHA512

                        964d84d4a696a85df42b07bbc9104a4e02d6d33c59c08c23e48850ac02c655c9a9d51357b18cd9eeae0942141b355e36001e774665e2c5c951904910bad352c1

                      • C:\Users\Admin\AppData\Local\Temp\RESE8D4.tmp

                        Filesize

                        1KB

                        MD5

                        6e468a953bce84316c4265055b2eea51

                        SHA1

                        81c6eb6ad92a18c90ed6fa6acc7a2fb505796c04

                        SHA256

                        bb2b59672e2789ece6f5b705e5e5943e4dd64b964d31b86101f49ba7af0d1edd

                        SHA512

                        da4e6c93439a65b1b1b45e06c7143000542302edef540bac51a57471b61ec719e0b13b29de0d33dc6c4454780c4ea5a407721b67f28474f97e7bf4ef28bd4ea8

                      • C:\Users\Admin\AppData\Local\Temp\RESE942.tmp

                        Filesize

                        1KB

                        MD5

                        999403fbcb58e5c4a37c5fbf23760699

                        SHA1

                        53f62ba27c87fe0223171262c4c58c28030e4b82

                        SHA256

                        56de54bdd96d7db2c6623ee818064cb415f3368a3a6906d9f5a2c2ec9e0909fb

                        SHA512

                        5a8a297d9ba7ab408956c17139dbbffe154985159694b1f517d261e4c47b5d8fe9d70dcaef19f44cd6d1201da5a15ec8fabc570c6387ec0b503e6c2ee729c91f

                      • C:\Users\Admin\AppData\Local\Temp\RESE9AF.tmp

                        Filesize

                        1KB

                        MD5

                        76e498335b585ec8f7ee28af2fb5510a

                        SHA1

                        ed28b0ab8c5025d55036faec057272641e8896f4

                        SHA256

                        ca12a61c9c959c012f55846ac4f274b884acc3289c4e9dfbb927cbcb1772ee32

                        SHA512

                        328d2414a6d0161ae9c636afeaee2d6a9f53a8e28552c8d8ff65481035d3aff30a490450585b8cfdde41cdc1899b28964e4a489a85b802ba7d05204f26911b28

                      • C:\Users\Admin\AppData\Local\Temp\RESEA2C.tmp

                        Filesize

                        1KB

                        MD5

                        f23d608f9852f90471e97fc2e75a977f

                        SHA1

                        709cef6674f1dea1079e729db5885c5c60c599eb

                        SHA256

                        eecece3f8e302ffb6ecfadbacd5ff102a46b3ea8d53bcd8d3e496f72e6668ca4

                        SHA512

                        98cef2db9c80f98119782e8ef563a7de28640e0c23f939a1c50d65fc6d0dbcf799bf8dc92fc3c905b1571de77daf43f8d69514edba889bd9cf31d6efddf180d1

                      • C:\Users\Admin\AppData\Local\Temp\RESEA8A.tmp

                        Filesize

                        1KB

                        MD5

                        8c0732188b770232216f3006ce54da71

                        SHA1

                        0d9ff06737b13ae05b9c8513556ab33a19e3ca42

                        SHA256

                        0c3da34ebcba5b9db20ac1edd550f9b88fe82c43b70506676bc77e940177aa69

                        SHA512

                        46ce5458234ee2b748fe6e391659e0301f3030b97a258ceb12075594b709205d4a613abb58b1524cff36fdb5f094e404b3e5657480c308b2758b94d0a740bf19

                      • C:\Users\Admin\AppData\Local\Temp\RESEAE8.tmp

                        Filesize

                        1KB

                        MD5

                        4f9206964fd606fb515413c9c9088a3f

                        SHA1

                        0543a21a399d654b20648fbc89337c8467bb3693

                        SHA256

                        c985dd11ad666905f314881d9bc5236967af244b0e237ad0304dbe89b033824b

                        SHA512

                        367d5cffb49ed2867e93af07ce6cfac74ff048fa3c1ad0720cf5dd1840a85b209b99bc9cb0bb9d3b44de7fa2694ae0e4d825454fbafe3edc6f2f0e22e4c45ec3

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_dexy0bdd.zyy.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\a82lia1o.0.vb

                        Filesize

                        271B

                        MD5

                        325f27ef75bebe8b3f80680add1943d3

                        SHA1

                        1c48e211258f8887946afb063e9315b7609b4ee3

                        SHA256

                        034c75813491d628a1a740b45888fc0c301b915456aaa7ba6433b4f1368cda35

                        SHA512

                        e2165b425558872897990953c26e48776f45751a53da035f1ad86ac062ec23a2923b984d84f992de5c0170f6e192feb155ffff25f51bc76ab273b996daacb804

                      • C:\Users\Admin\AppData\Local\Temp\a82lia1o.cmdline

                        Filesize

                        171B

                        MD5

                        7b2b314f8db3b110df1bb67d940e3a07

                        SHA1

                        5800fd54a2d87fa4175df5e26c4fefac54f9824c

                        SHA256

                        66e591ffcd03c42f0ae55d27cc54c35eef76f5de8f04e801defd9e06abb6dee0

                        SHA512

                        701f83d53e7f5979509e2ebf6614d2534efb631e31fdbdc10cd62d68b90d8416203bcfe05f9884e6bf97876113646344f1950598e2b20c6cf4d10d25a78b9d24

                      • C:\Users\Admin\AppData\Local\Temp\aprhqrup.0.vb

                        Filesize

                        262B

                        MD5

                        88cc385da858aaa7057b54eaeb0df718

                        SHA1

                        b108224d4686b5ca3faaeb1c728dfba8740a6eca

                        SHA256

                        08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                        SHA512

                        4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                      • C:\Users\Admin\AppData\Local\Temp\aprhqrup.cmdline

                        Filesize

                        162B

                        MD5

                        bce7077119d604df56124a33c927b4da

                        SHA1

                        0da4d85dd1c0fffdda4e39c47ad504216f5921f0

                        SHA256

                        af6321bbacd6565c5ea8aa36a8e353f9476107a5f08cf1c776ce89e140720774

                        SHA512

                        1160a6a48fb889ff22894fac8715a2cb4751590fde491b7414c679171ad227d788d8759b5125575e10a61386250aa6ee2895fb8e021a88aadcb8ab3d8c8ddb00

                      • C:\Users\Admin\AppData\Local\Temp\ldlpf9la.0.vb

                        Filesize

                        273B

                        MD5

                        3c3d3136aa9f1b87290839a1d26ad07a

                        SHA1

                        005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                        SHA256

                        5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                        SHA512

                        fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                      • C:\Users\Admin\AppData\Local\Temp\ldlpf9la.cmdline

                        Filesize

                        173B

                        MD5

                        2da8dfcf9bf0fdb4bcc241d5d67fa192

                        SHA1

                        9e3d42b33ba031b4a920becc9c1dfdaf0d25b1f9

                        SHA256

                        e2dc1c6f61ebe2d798edca277c66d95d34958a2554bb45370dbe62c83fa96c2e

                        SHA512

                        9bd8574453035f75f2834c8d834c7b16c7f5e198a2c3a41baeee8e599930dada2649ba6ade8238b1ecfac0a555340dee3207a10d72f68066a0223db73772addf

                      • C:\Users\Admin\AppData\Local\Temp\ntp9t24b.0.vb

                        Filesize

                        270B

                        MD5

                        658573fde2bebc77c740da7ddaa4634b

                        SHA1

                        073da76c50b4033fcfdfb37ba6176afd77b0ea55

                        SHA256

                        c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                        SHA512

                        f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                      • C:\Users\Admin\AppData\Local\Temp\ntp9t24b.cmdline

                        Filesize

                        170B

                        MD5

                        bab0bd3107953b9b2481b276f20722ba

                        SHA1

                        6fedf1ff8c3253b71a4b126e8436da5f336ed6af

                        SHA256

                        ea5e891666b93f3f91109948dca6018c476f8010286f3b076571e8fa2e19b00d

                        SHA512

                        523171319ca8babc40e29965ec31f75730615af1f8677125381909065dda16c0b80cd06d6827883131a4968b046df1d2d96f28cf79636e4740a1efed81fc0e68

                      • C:\Users\Admin\AppData\Local\Temp\qgfeewhu.0.vb

                        Filesize

                        274B

                        MD5

                        539683c4ca4ee4dc46b412c5651f20f5

                        SHA1

                        564f25837ce382f1534b088cf2ca1b8c4b078aed

                        SHA256

                        ec2210924d5c1af6377ef4bdf76d6ca773aaa1ae0438b0850f44d8c4e16ef92e

                        SHA512

                        df7c1a55e53f9b9bf23d27762d2d1163c78808e9b4d95e98c84c55ca4ecb7009ed58574ae6ddede31459f300483a1dc42987295a04f6c8702f297d3f1942f4ac

                      • C:\Users\Admin\AppData\Local\Temp\qgfeewhu.cmdline

                        Filesize

                        174B

                        MD5

                        234071fa77fbca4b5fa88c03e159a508

                        SHA1

                        12623094613ca2bc6c04cd0edf7096a3f478cb74

                        SHA256

                        ad46c81bfdaff5acf6efbce2744c4d5ca96fbdc5e33546e85d33307b5dd8cab2

                        SHA512

                        532c90a5aad306c8f304b438f83586423bbf4887af75f2faf8c47c38ebd7a6a6404503ce64b3348be5604e8ec6b36699d519e2339316e063b3aa4c001b664489

                      • C:\Users\Admin\AppData\Local\Temp\ro-eywli.0.vb

                        Filesize

                        271B

                        MD5

                        ac972015bef75b540eb33503d6e28cc2

                        SHA1

                        5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                        SHA256

                        fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                        SHA512

                        36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                      • C:\Users\Admin\AppData\Local\Temp\ro-eywli.cmdline

                        Filesize

                        171B

                        MD5

                        11f0f9b0822e72af59ee9a39f599aa3e

                        SHA1

                        ed3781b9b78ebcc2a9be4007486d7adcd04c93b2

                        SHA256

                        b7222e3dd95b5d9156e5541601911c5ff6005d3259c63350eb2b68fa88e72971

                        SHA512

                        55db4ddc9cca78a44c8c97a18a4772f5aa34658faf67b8296d6c591a088c67425b99267303c54aec64c81292f92bad1f3154ac4b68a0ff1752e5a31d4831d242

                      • C:\Users\Admin\AppData\Local\Temp\s3ixbijc.0.vb

                        Filesize

                        256B

                        MD5

                        076803692ac8c38d8ee02672a9d49778

                        SHA1

                        45d2287f33f3358661c3d6a884d2a526fc6a0a46

                        SHA256

                        5b3ab23bcadaeb54a41bdb1636bcaf7772af028d375f42baeb967de6579ef2a3

                        SHA512

                        cc9126384a287ccb99d10d5c2d3034cdbc8a45e94f1cec48dd95f2aa08ebbe3053ffd6d6effa31f2d84164edbb6136398cd02c08b05f027a6a777dffd1daea5d

                      • C:\Users\Admin\AppData\Local\Temp\s3ixbijc.cmdline

                        Filesize

                        156B

                        MD5

                        595910b0c8aaa2c4d99c75d96b05dc38

                        SHA1

                        d1cb9634096a469024f0984c0bd991f670e6fc5f

                        SHA256

                        3694408c364b27d4a907b804519e5987d622bc9c6dd10d60eeb8adca5ca7d78d

                        SHA512

                        ed6c8b1bd8893680e732aa072862e1d0612d0794a320b4d126e5d7ec9b63cd035929a0eb0a340781d3659e54ef6a385eaf3f699d38f6c704da897882802340ce

                      • C:\Users\Admin\AppData\Local\Temp\sfouhrs8.0.vb

                        Filesize

                        264B

                        MD5

                        5ce3977a153152978fa71f8aa96909e9

                        SHA1

                        52af143c553c92afc257f0e0d556908eaa8919cb

                        SHA256

                        e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                        SHA512

                        eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                      • C:\Users\Admin\AppData\Local\Temp\sfouhrs8.cmdline

                        Filesize

                        164B

                        MD5

                        e60a1a3a59b97e7a13694dd2e5e30900

                        SHA1

                        20663adc5eebff734a5cc56a68001fd3325820fe

                        SHA256

                        ef93d8e2cfa6b747e16692fe4ffc4b7e53543391311c76ff0683c083dc7fcd43

                        SHA512

                        68d61ab4379222733326f8b33de622a2c69625b62639c19caa4739554b9d65c947a6f985bc0932d949373e1f6d714b8aad712e8e1feb9f1a1ede1c5c14bbedab

                      • C:\Users\Admin\AppData\Local\Temp\vbc607812CAEA524B398D47826BCD3153E0.TMP

                        Filesize

                        676B

                        MD5

                        85c61c03055878407f9433e0cc278eb7

                        SHA1

                        15a60f1519aefb81cb63c5993400dd7d31b1202f

                        SHA256

                        f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b

                        SHA512

                        7099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756

                      • C:\Users\Admin\AppData\Local\Temp\vbc6BE538EA271A4726A0E04CF8E593B3E1.TMP

                        Filesize

                        684B

                        MD5

                        8135713eeb0cf1521c80ad8f3e7aad22

                        SHA1

                        1628969dc6256816b2ab9b1c0163fcff0971c154

                        SHA256

                        e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a

                        SHA512

                        a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4

                      • C:\Users\Admin\AppData\Local\Temp\vbcC3305F5D5C8C4E608B6B96991FEEDB3.TMP

                        Filesize

                        684B

                        MD5

                        7a707b422baa7ca0bc8883cbe68961e7

                        SHA1

                        addf3158670a318c3e8e6fdd6d560244b9e8860e

                        SHA256

                        453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                        SHA512

                        81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                      • C:\Users\Admin\AppData\Local\Temp\vbcC9F7E1CF9E2546388A51B21DBF71B71C.TMP

                        Filesize

                        644B

                        MD5

                        dac60af34e6b37e2ce48ac2551aee4e7

                        SHA1

                        968c21d77c1f80b3e962d928c35893dbc8f12c09

                        SHA256

                        2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                        SHA512

                        1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                      • C:\Users\Admin\AppData\Local\Temp\vbcCE5E5495FFEC4A25BE527C53A3AAED7.TMP

                        Filesize

                        668B

                        MD5

                        3906bddee0286f09007add3cffcaa5d5

                        SHA1

                        0e7ec4da19db060ab3c90b19070d39699561aae2

                        SHA256

                        0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                        SHA512

                        0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                      • C:\Users\Admin\AppData\Local\Temp\ww5y6lqa.0.vb

                        Filesize

                        263B

                        MD5

                        d1110a95f1e40f726584bd99eca52fe7

                        SHA1

                        97fac683e1116ab31a9cc9c3dcfd9fe9e53505c3

                        SHA256

                        00f373eb310beace70146b6e0fd188aa2f437efb2e5a2714a11d4d58e27d3142

                        SHA512

                        f15b5b310ace82a0106b551d71ad3d48e1c75085aa78b8bb3374a2334ceb073bd4d1bf4cd0b4e39034c39f01b6bcd76e8be30198e4872f5641a7d29b255154b4

                      • C:\Users\Admin\AppData\Local\Temp\ww5y6lqa.cmdline

                        Filesize

                        163B

                        MD5

                        2b1ca57d6410f48755b62f08a307d430

                        SHA1

                        c5cbfa7c4ff343bfc7f3537f662ddfca97142eab

                        SHA256

                        0c77342f1f9f6ae9e3f2a0b237249948d0953eaa5cb705559140d4ee7eef06e0

                        SHA512

                        6f68b0e485c74d3d5c9fff1bdf9be3bd0d560f849732c56166642e54be00cfbc6c477ee2b5d6d43de41dd3741a29ab2e1f3b6c11705248fa23f92e69b7bddf9b

                      • C:\Windows\System32\MSSCS.exe

                        Filesize

                        21KB

                        MD5

                        6fe3fb85216045fdf8186429c27458a7

                        SHA1

                        ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                        SHA256

                        905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                        SHA512

                        d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                      • memory/3068-36-0x000002DC837B0000-0x000002DC837D2000-memory.dmp

                        Filesize

                        136KB

                      • memory/4632-17-0x00007FFE0AF40000-0x00007FFE0B8E1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4632-22-0x00007FFE0AF40000-0x00007FFE0B8E1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4632-19-0x00007FFE0AF40000-0x00007FFE0B8E1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4632-18-0x00007FFE0AF40000-0x00007FFE0B8E1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4836-21-0x00007FFE0AF40000-0x00007FFE0B8E1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4836-0-0x00007FFE0B1F5000-0x00007FFE0B1F6000-memory.dmp

                        Filesize

                        4KB

                      • memory/4836-8-0x00007FFE0AF40000-0x00007FFE0B8E1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4836-7-0x00007FFE0B1F5000-0x00007FFE0B1F6000-memory.dmp

                        Filesize

                        4KB

                      • memory/4836-6-0x000000001C3F0000-0x000000001C48C000-memory.dmp

                        Filesize

                        624KB

                      • memory/4836-4-0x00007FFE0AF40000-0x00007FFE0B8E1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4836-5-0x000000001BAC0000-0x000000001BB22000-memory.dmp

                        Filesize

                        392KB

                      • memory/4836-3-0x000000001AF90000-0x000000001B036000-memory.dmp

                        Filesize

                        664KB

                      • memory/4836-2-0x00007FFE0AF40000-0x00007FFE0B8E1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4836-1-0x000000001B530000-0x000000001B9FE000-memory.dmp

                        Filesize

                        4.8MB