Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 23:33

General

  • Target

    a303abeb45c17496d1134401d5f1e4e6804e6bf0ce192b28ec73951d1ee361c8.exe

  • Size

    959KB

  • MD5

    2873ffc6801b6f646d9f14f339e7e550

  • SHA1

    23329c57d5e345e5f5d5aff41164168e6e3228a6

  • SHA256

    a303abeb45c17496d1134401d5f1e4e6804e6bf0ce192b28ec73951d1ee361c8

  • SHA512

    16fdd7a22e01b5b5eb39b92c1ee96df0aa355a3a47d14f08ce887f3684cef65250d7675c035dab6de79054a0d39237746aa4aa67d055872643edb9753a9458cb

  • SSDEEP

    12288:j6oLLoS60/K7yh0necHIgCIzoLLZefb06B+lHDBb+qL2pG3N8XNC834U:j6oLAehgCpgfb0W+x4GQ74U

Malware Config

Extracted

Family

revengerat

Botnet

Downloader

C2

79.134.225.46:6606

borah22.accesscam.org:6606

Mutex

RV_MUTEX-RYBGldGoFYEKgHD

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 50 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a303abeb45c17496d1134401d5f1e4e6804e6bf0ce192b28ec73951d1ee361c8.exe
    "C:\Users\Admin\AppData\Local\Temp\a303abeb45c17496d1134401d5f1e4e6804e6bf0ce192b28ec73951d1ee361c8.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uikeySIwHrUi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4D40.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:3536
    • C:\Users\Admin\AppData\Local\Temp\a303abeb45c17496d1134401d5f1e4e6804e6bf0ce192b28ec73951d1ee361c8.exe
      "{path}"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4288
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kwe3jouu\kwe3jouu.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3312
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB512.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc974519C82871448BAF7B541A709A8F57.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3856
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rw20gyrk\rw20gyrk.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4040
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB5CE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCA65B12E9F0E44F6904BCEFF62F9BAFC.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1640
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\d3pegp3t\d3pegp3t.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3320
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB65B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB190A1155758477FBD68466AACAFF53C.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3136
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\syblzblz\syblzblz.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB6E7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDE2026B630F446FBAE6E0EC403BB45C.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1240
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\z4tpyyhc\z4tpyyhc.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4816
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB7A3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE2552FD17AEC41C794CBFAA262A940CD.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2140
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\pba3bm2k\pba3bm2k.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4500
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB82F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6C0139A4FE8B47EBAD53EE1E5E21AAD.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:916
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\24tl1thi\24tl1thi.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:760
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB8AC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC96C77709120407A9FA1FC626E28689B.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4968
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2bmbekbp\2bmbekbp.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3708
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB91A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC63C577C879C4CCDAAA4484FB189D64.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:244
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xflcs4qf\xflcs4qf.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3296
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB9A6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCBFF3ABA962B493BB3A95B929D2C1C8.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4804
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\brzd1qxm\brzd1qxm.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1464
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBA33.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6A95CF3128E4319B3C04D5AE89F56A1.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\e5tx1ssv\e5tx1ssv.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3120
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBAB0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc567555A56EEC4666A0465326D3E5E58A.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3424
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\r01jqftr\r01jqftr.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:804
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBB3D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc92BEC823A1784029A24247415B11F3E1.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:532
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\e0n3pu2h\e0n3pu2h.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3792
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBBAA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3E2D282E906346719A79548116B85BD.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:932
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bbwl2fmr\bbwl2fmr.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2184
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBC37.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4B748FF94EDA437FBE1297A83191426.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1972
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kunf0dmv\kunf0dmv.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:672
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBCE2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc953FF204F8774980AC8145F88F51E6C.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2984
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2z1sk34e\2z1sk34e.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2352
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBD6F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2BA362EE12DA4F729986FE656ED9B5C4.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3320
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ilnxywvp\ilnxywvp.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3308
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBE0B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2701D4DF4CFA4B00A744388431564A3E.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1052
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\r5lplzmv\r5lplzmv.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1732
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBE98.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFFC32E004B8B4EA196D9B61EA84467B.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2140
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nuzm2dvg\nuzm2dvg.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1572
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF25.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3433A5FDD7C84E7FB89CB34937C2BEF6.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1760
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jr30wsty\jr30wsty.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3412
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBFB1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBDC002B191124716AA634786849D754E.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3436
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nz04ixys\nz04ixys.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3416
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC02E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc566A7D7E38A2489C9FEA3C5F4DECD1C3.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2576
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\h33uiod1\h33uiod1.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4616
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC0EA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc88CE18BF19844D11AA2139CB606C9358.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4236
      • C:\Users\Admin\AppData\Roaming\msword.exe
        "C:\Users\Admin\AppData\Roaming\msword.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1436
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uikeySIwHrUi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp81E8.tmp"
          4⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:4376
        • C:\Users\Admin\AppData\Roaming\msword.exe
          "{path}"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\mswords\vcredist2010_x64.log-MSI_vc_red.msi.ico

    Filesize

    4KB

    MD5

    fde1b01ca49aa70922404cdfcf32a643

    SHA1

    b0a2002c39a37a0ccaf219d42f1075471fd8b481

    SHA256

    741fe085e34db44b7c8ae83288697fab1359b028411c45dab2a3ca8b9ea548a5

    SHA512

    b6b4af427069602e929c1a6ce9d88c4634f0927b7292efb4070d15fb40ce39fc5ce868452dcd5642b2864730502de7a4c33679c936beb1a86c26a753d3f4dc25

  • C:\ProgramData\mswords\vcredist2010_x64.log.ico

    Filesize

    4KB

    MD5

    bb4ff6746434c51de221387a31a00910

    SHA1

    43e764b72dc8de4f65d8cf15164fc7868aa76998

    SHA256

    546c4eeccca3320558d30eac5dc3d4726846bdc54af33aa63ac8f3e6fc128506

    SHA512

    1e4c405eca8d1b02147271095545434697d3d672310b4ea2ecca8715eaa9689be3f25c3d4898e7a4b42c413f258eda729a70f5ad8bc314a742082b5a6a8e9ff1

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\a303abeb45c17496d1134401d5f1e4e6804e6bf0ce192b28ec73951d1ee361c8.exe.log

    Filesize

    1KB

    MD5

    8ec831f3e3a3f77e4a7b9cd32b48384c

    SHA1

    d83f09fd87c5bd86e045873c231c14836e76a05c

    SHA256

    7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

    SHA512

    26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

  • C:\Users\Admin\AppData\Local\Temp\24tl1thi\24tl1thi.0.vb

    Filesize

    372B

    MD5

    eb8c611d99ee56cc01c46447174a89c2

    SHA1

    d7bfaf8ef2145cdefe43c1a73310ad99d1c43a97

    SHA256

    d601f2c5c080b0f2c5bf01b8516fdd83a1effd9b40ed4371ead7604a8008321f

    SHA512

    d5280505424f9689cabd21d7f227766ec8b59090544b04835e7d7f09fc826d54c29a9bfd7bbb78f832e029547c4c161e487d49a55873307ca796c5e3d282f748

  • C:\Users\Admin\AppData\Local\Temp\24tl1thi\24tl1thi.cmdline

    Filesize

    270B

    MD5

    db689f25c953a133e664cff2d22c830e

    SHA1

    79df4d8a7bd6f63c00e8c861d80b25d505dcbdb8

    SHA256

    0cc036da9f9fd5fc94e28575abfc47aca5188e65a4efd82e288b6482ff31c58f

    SHA512

    44c4c033b2b2441de91324b9f1912056260a79c8158e2020e18fcb3a6b8eaa858ee50675c518f1363d67246fe5a40ee6063fb6a68e64a91e55c79fdff4edef85

  • C:\Users\Admin\AppData\Local\Temp\2bmbekbp\2bmbekbp.0.vb

    Filesize

    375B

    MD5

    555ff0d78fedaca065a7775b8a0f7a39

    SHA1

    9c7ec4e982bac8296d83418d190d25c0c6954ce6

    SHA256

    ec7ad573e26be1b1cfbf14fc08a7cb9d37a749b7d86b8c96f006dac160b7323d

    SHA512

    3af80720c1ccd7abb5ccfeb768c1554a380e875a5e7f752f8eb8dca34b83ad41ae293e3b7b3125ff73da36cede614f2eeb47cbf83004d52624c02e5aad0c331e

  • C:\Users\Admin\AppData\Local\Temp\2bmbekbp\2bmbekbp.cmdline

    Filesize

    276B

    MD5

    2d5adb76f59ee9f8a2fde06ed7dabbc3

    SHA1

    3cc69b0bdd31d3ed54ff0b959aa2d8ccda4c89ea

    SHA256

    6d21579e81511cec90fdc275e1b247d63241cbf562b200e6dfd01659260e19d8

    SHA512

    79469c2d88aac2614e1512df015ae6c207d82a4168b6fe9c95bf76e565b2ef77e6abc49461f0169702c25b2ec49ef1b0e93bd5c108ca65cd9590145a24fe2f0d

  • C:\Users\Admin\AppData\Local\Temp\RESB512.tmp

    Filesize

    6KB

    MD5

    eb19583d62752c828918da4d8a94e387

    SHA1

    0c79e5c34be301c5fc0246ed5b07ae182ed97a3a

    SHA256

    17ca015716b27a2f011640003a7b4c1e1dd2073621bc2c740259530832d7934f

    SHA512

    fa382c17f11232952b15f9a57997b24c6bc88702f52c84b94adc5397c4554f84b2d2dae00d76e1bb7d2e11ffdad226332248f14aef3eb44edcbb5fc50fdb59a5

  • C:\Users\Admin\AppData\Local\Temp\RESB5CE.tmp

    Filesize

    6KB

    MD5

    7beb7431fbed1070babeaf1c0ee900de

    SHA1

    00bca6412a2ba4a725daac5472120896ce8e5ba9

    SHA256

    4d44884e772a05c2f6823ff01d9976b9bf713e190b3f0e38860fbaa6307aeb58

    SHA512

    63715fdcc2e75eac20dd9bf3e2b413c27cddece1318a1e8ce397a7a031b50ef8988db050b492e381c4fb04d03435e05bad61147dc48963600a25ad495dd66342

  • C:\Users\Admin\AppData\Local\Temp\RESB65B.tmp

    Filesize

    6KB

    MD5

    51a922e36898d5fd2a846c0af0551b9a

    SHA1

    d03c9d619794b13ae3a31d986cf10e9a7ae055cb

    SHA256

    a110400ee18a8ed9a3a44c3ab0a6107c1c92cf75d0b6338b86a50250393ae575

    SHA512

    0b4bf44da7b4c646dff615043b67b8396906700fe9c3d2a0493d27c27d930600c66b922c9beb9b57a628411a0ab2971ca504f63a6bee703e43cf473faf239987

  • C:\Users\Admin\AppData\Local\Temp\RESB6E7.tmp

    Filesize

    6KB

    MD5

    4da79b8a5ab56074644315af6babe1dd

    SHA1

    87742fbf1e7d15cd27db57d7009e51e4468328cb

    SHA256

    057076dd20f429e6871cdd97c897cb40976e4acc106b2cafcfc9f7de99b963f5

    SHA512

    653f9183536c0a971568b09888487a1bea8c9564a54c8de763e09b63327983c59673582578547831b0358f25ddd7e5f5431ccc904e033e45a5d14f32a6269ff3

  • C:\Users\Admin\AppData\Local\Temp\RESB7A3.tmp

    Filesize

    6KB

    MD5

    276f712447396055d240fb4534a47cdc

    SHA1

    cc246fe550e59002107d2c05150de04a9a538307

    SHA256

    c1f02f385d33704371544c357d1320fc57edc43da5b4651bb0739335fdc534e1

    SHA512

    7a5aa5b9e733eb473cf34dd7ebac29c017f20d52774c71f6935ee2edcbecc18336635e70bb26ccd701a71e808704891ff388b3692427913b946fd31fc81745b5

  • C:\Users\Admin\AppData\Local\Temp\RESB82F.tmp

    Filesize

    6KB

    MD5

    d418d9abe7fec071e6467002bfb134c5

    SHA1

    a12a35cb9b459a27937d987d8cb5f02ce790a00e

    SHA256

    427284ea6e8aebb197f5bc0a56a22e129a26102953bb5a1627cdfaa22925d32f

    SHA512

    4a3f516f276fae75187a7bbc8bb63de0c079fdeb0d1bed0130bbc92d7f65bf12011a4cf912b5fb4fe2d35f29d9b7d0a86d7b82ed9361bcb48a1ea977cbb3f9b8

  • C:\Users\Admin\AppData\Local\Temp\RESB8AC.tmp

    Filesize

    6KB

    MD5

    dbedbabfd6b0263d1f9be277ab90f690

    SHA1

    98ac618d67e0720c6b4eff2af9ab2f1a5d1cb302

    SHA256

    9efed25dec2ed5550f893eba7b8cac363341a27d9e349d171d2f234bed66e3fc

    SHA512

    a01395b7a974bef9766c055804864464bcb5d070c4543914a577ef2eaae66d10d803feab400650920887f3b9fb693a32f99f3577525e92d6e8ca659e72fdfd74

  • C:\Users\Admin\AppData\Local\Temp\RESB91A.tmp

    Filesize

    6KB

    MD5

    f045763698e70e75c231de6ae5c049c1

    SHA1

    544e8ae980a2f7757edebd0d2933b04765d814d4

    SHA256

    7c69c849df4494ae856a573713b15f84ddbe5574729f3cb8f261a4e5eb30988a

    SHA512

    d28cd292c852700fbb23f6432a9678ee61c498b5f75d95996bf7de9d9fb89bc2c9d1254d6e546e8462398450cb8ec6c2303306cee9895b0e0e715c2621182be5

  • C:\Users\Admin\AppData\Local\Temp\RESB9A6.tmp

    Filesize

    6KB

    MD5

    40a409d6914adb01dad24cc7ae45b0cb

    SHA1

    8e8541cb0c37960a346aa72f9d0d8300cc3d9d48

    SHA256

    8c24c84d1356a1678611e4e1f2325635b9ba68b487e4c572edfe4b1147242b74

    SHA512

    a58bd2d60b058d01fc328b429548233e9ab1cd962ffe2a101e00e8ed8d79a2e122ace270e006b598b36daba6c4dfece5b8d86109962ea3a58559a513d38e229a

  • C:\Users\Admin\AppData\Local\Temp\RESBA33.tmp

    Filesize

    6KB

    MD5

    8e93dab4ae328d79721d4fa475bd70c0

    SHA1

    25ed2798bd750e96519c600079944398fa196074

    SHA256

    e4c5fc56c59227f915738b2fe21ecd95936242682a1e2a8b196bcf57627c4cf3

    SHA512

    6e013388303873536dfc9dc03413589c45a246bfa07da4d3104e692230b228aaae37a9f4e4a80d04faec47cd6fee8c3a471874d0abbae2c31f7fd2f76f2ea130

  • C:\Users\Admin\AppData\Local\Temp\RESBAB0.tmp

    Filesize

    6KB

    MD5

    44d581e5aa854b716a22404ee55080aa

    SHA1

    72e96f2e1670c001a62ed2be60e97904a9bfc2b8

    SHA256

    e8ecbad3a68e9cbd8690f2b9ca1ed2de089ab0c3a80a5eac4334399e89f491b4

    SHA512

    5a528bf0c6a39c4aa6473ea1d331ef20ec152b982223264bba46e2a838f1cc316030bfdd61458a76730434841a8be880341b1383fdf647909690a2c2a3c05899

  • C:\Users\Admin\AppData\Local\Temp\RESBB3D.tmp

    Filesize

    6KB

    MD5

    b10482fa307c80d903b197a56384f566

    SHA1

    0d63ab2f26b32a32edf7ba0044dbb49cce0ae5a5

    SHA256

    ee9ba3e884652e3d35f5db07d5607edef6751f32e720a011ea5b904796f3b083

    SHA512

    fcb6c86c13e3588c8de629eff00b0e37f8b8007cf7f136d6724de65ddbf62d4fdcd5f3bb600b4aa13c2a83d672a2a63a79174b78bdcc577ea38dd42b42bf4cc9

  • C:\Users\Admin\AppData\Local\Temp\brzd1qxm\brzd1qxm.0.vb

    Filesize

    377B

    MD5

    9c31313f9e8ab8198a3d244c804c672c

    SHA1

    93c549279ca36725f41beda1d9b3580f2b380180

    SHA256

    585fb32d37ab22de89f020e9e736b0ad1a81576231585abd3eb53477318b4261

    SHA512

    b84ea60e2ff21fde54b228c7358a039635250f250dfd6a3adc3a9e5b2984016a318c105ccec94bff6346033c52019dc7d0b1cf971c52e5b7e09e23296aa13fc1

  • C:\Users\Admin\AppData\Local\Temp\brzd1qxm\brzd1qxm.cmdline

    Filesize

    280B

    MD5

    bdadaa3ac93e5fd5007a36ab6bb4f5c7

    SHA1

    2112304b407bf4f3e7dfac0cc86b9a2225412962

    SHA256

    ca42991165263c0406b20d1d2a05b1e63e929cb20124930889b336a5362473cb

    SHA512

    aa96363524fd12ecf39b00b1f605c724e15a326734fd6af1c6c8a7e61e48af1c551fed2e74215468526a8d37df9a2a189fbec89f1bdf16488425349b58b5930d

  • C:\Users\Admin\AppData\Local\Temp\d3pegp3t\d3pegp3t.0.vb

    Filesize

    368B

    MD5

    b1e9a082a09858e9dcecccdbc8f19a13

    SHA1

    80634dc925f1fca77af3505208e4a40b5e666f71

    SHA256

    f343014a1a810e6a348fab51c5ce7e7accf1ba3919556cf8e14567df9a5f2328

    SHA512

    333186d7fc88e452faa1075fe9e4e1ba5485f746ac5ecef020bf79cf07836fc949c5c07c72e64c7478f1d44a29d4985ce7a510f96b870abe418adc4a8bdc3236

  • C:\Users\Admin\AppData\Local\Temp\d3pegp3t\d3pegp3t.cmdline

    Filesize

    262B

    MD5

    a003f471e57bd0e0997d5a1c40fb8023

    SHA1

    55691194e2bb95aca0e24928e2d383c8ac30d5a7

    SHA256

    d7f2bfb860c0ccc7b82a717a2e27680bdf18ab5c1f1a57e818d23740fb7a496f

    SHA512

    a952e91bd741a41ee4112755ca6b068a267a895196512597cac20365ee05a0496dd9a0aa06ff42042298fb8f0f0da97ed8acaa2404c8d41caa5868bc762812a0

  • C:\Users\Admin\AppData\Local\Temp\e0n3pu2h\e0n3pu2h.0.vb

    Filesize

    374B

    MD5

    2ab6af09d9d063a5e77c142925669b08

    SHA1

    5d336d2d41823319028ecea467176618ba41f8da

    SHA256

    8338246d8eaa32cb005a608278e60a2ee5ef0fba336b0f4f9a6e65e669984876

    SHA512

    6b2724fd2546606517d816b56f90b12e89987b208030690abd97513a948b674d837069826365f13b7a9ef2937c4c7049412753ec20c45b5ca43a60e5f1d69198

  • C:\Users\Admin\AppData\Local\Temp\e0n3pu2h\e0n3pu2h.cmdline

    Filesize

    274B

    MD5

    ffde8a9c6f19b0fa100d11331ee2e49c

    SHA1

    de0ac063b6a9e369ce246d005ed006061d07f99b

    SHA256

    316d87ceb961191b20b9a13bdbd9dfa087aa2a4dc53e5bb89833379727e18cd7

    SHA512

    e25c588e6ebc4b604ba2ec3e06c1ab82cd2a1159f4c8359c424efd008b5bdff0fee475b737e71f9b2bd471b8f0221a1b80c1402a3723e1da66cae9fcc914afd9

  • C:\Users\Admin\AppData\Local\Temp\e5tx1ssv\e5tx1ssv.0.vb

    Filesize

    374B

    MD5

    973ee0fba60af8ba4b1338fc3a6008aa

    SHA1

    7cf8ea39c82a2df29768796a22c90bb278c9c3d8

    SHA256

    55f85ead5672725c654e50c2c053ffd65dd599488dabd11268b5468d008d13be

    SHA512

    788053825bb1241daca33a0b9a451f4235db9dff2d279b592e25ea680ea1a74f2fc3e09157776ad323b5f229244ad3f54c35bedbf1220199e47a88796175f5b4

  • C:\Users\Admin\AppData\Local\Temp\e5tx1ssv\e5tx1ssv.cmdline

    Filesize

    274B

    MD5

    ad715d5ace408a2917196de0956f6923

    SHA1

    dab93e92fda732b4afb8032b5a725e2a724d5624

    SHA256

    21e9b7f4bfa917de4c324b8ecce71fa96d205a65ed1f92f96b051738c61aaaf7

    SHA512

    3d4aca2808024f387d434bf8fb25d39669e698cd6b73e1c0b090383605b64a27c6f463f52a457c606bf644dceac9ba2f72b528178e41723f31d59551f1120936

  • C:\Users\Admin\AppData\Local\Temp\kwe3jouu\kwe3jouu.0.vb

    Filesize

    368B

    MD5

    ec1e749d09e29b39da3e49fb757d54c3

    SHA1

    64ea573813372400e484bd2a4938f5e18fc52bcf

    SHA256

    1e63296616323329eacbd1e3cc0fd6bb40c2a2d997f6bd38f391839a8257a249

    SHA512

    20fde5e913f0d7ec6440aca31a4da3ca1b310ed007ef7d59289911a2b5d24c9f4fc004a69922a02695f3655b4a66bff71c9641404bb8abaf1f43d05c6cb65ec3

  • C:\Users\Admin\AppData\Local\Temp\kwe3jouu\kwe3jouu.cmdline

    Filesize

    262B

    MD5

    bd7727df252cf7ebd855cd0500c756fe

    SHA1

    f203bb7aa9a685168913a7a890f7e6beac7bc6ec

    SHA256

    4b07e8607c3f6767db95d5de3b75f3078c90e1c1e2d2cc3a7d9396fb1092f97b

    SHA512

    87145ac920a1bb323c8dc8768b134a9e91850a3ed1005d7ae3ffe75f561f9e2b355c4643d11df91cc3cbd34254e3fcd392a9590829c8da9c021fa6e7a52d3d65

  • C:\Users\Admin\AppData\Local\Temp\pba3bm2k\pba3bm2k.0.vb

    Filesize

    375B

    MD5

    39b0e02d661815460aae25f7807fa6e0

    SHA1

    6f459f82430e400de734c147d30ab1fc0e8fb031

    SHA256

    93edba831b445b727c57c3ce9b5d21a2c48e850f63854dc6403a806edcf05ac1

    SHA512

    3ba009d4d3d44e1961db16035f1fb7e54fa1304815166d0bfc8e64979364fc5f8495ed1765cbd168226f3564b0829215c914c9972fa3b8bcb8176f5342bce04a

  • C:\Users\Admin\AppData\Local\Temp\pba3bm2k\pba3bm2k.cmdline

    Filesize

    276B

    MD5

    44260a6faceb3afebdee4792cbc14660

    SHA1

    6418264db3834527512f53f9f547d8afab3aff20

    SHA256

    45343ec0c6ca30511f1b0ce72497dbbfcc6e23c5f09a6daa37436cbadb5f0f89

    SHA512

    cdbbe40f85567c586a2608144aec11845f91ff9e91cde7c355046c57e85f9a84cc08b5777824f79f378104402c41031cad177723ecb0e4963b0bf8a6e1481679

  • C:\Users\Admin\AppData\Local\Temp\r01jqftr\r01jqftr.0.vb

    Filesize

    377B

    MD5

    ddb58bf98ebb773c2a3fa6b84616acd1

    SHA1

    2e1c946bc3ff36e7e0019947c3ca3ea6cfb1f29b

    SHA256

    5b2ba53c9c014bd65aabd8c30255d679efa5c0585726076bec9e243f826f6df6

    SHA512

    489d55e227db08c81e26a851bdd0197429baaeb457ef1926782c360086bf73a569c7f51d74c1ff9a73d5e89b5e22a998ae011b45fc8b84aa2ab298ec38be3ac0

  • C:\Users\Admin\AppData\Local\Temp\r01jqftr\r01jqftr.cmdline

    Filesize

    280B

    MD5

    9915e74cc4cd6b19ec7e48b2c91d356f

    SHA1

    19b1157e76971a6f027ec57892bb7b9c650bb94f

    SHA256

    7842fce21ffae5e0f70819835378b240b39573aeed1f87131906ea77e2679044

    SHA512

    bab9e3012562952aa6a93013f21a0227d1669047c8cab3c3a6998d372873c8d445fad41bb797920d5843ec8fc3f7c1096d4e99fdd238f5f6c75e4dd256450002

  • C:\Users\Admin\AppData\Local\Temp\rw20gyrk\rw20gyrk.0.vb

    Filesize

    354B

    MD5

    b7ba083aee5ce555ef5f9b543796a61e

    SHA1

    5edf35afa0de83196c6fed083b76785f490a7a04

    SHA256

    4e28965b9652b063edf63bbe490e3542dfe6a54b5d31de6d73b650b1a814a802

    SHA512

    57e654261583f935c7490957043099c2a0f78ddf3daa85ef8a9dd4fa3a268173b16f24978a191afa2fde829a85f1a76a532d9bccb366d33e1783636c220f37c3

  • C:\Users\Admin\AppData\Local\Temp\rw20gyrk\rw20gyrk.cmdline

    Filesize

    233B

    MD5

    5d8e37bc46acb0f4a71a4f011d717448

    SHA1

    8f67cb3141c1a780e66faa8576d614ed395df6f0

    SHA256

    e3d8c56af055c09771208efcaa542a23feddae8537158fb3c53a4a4709ad619f

    SHA512

    f35616971fab938b23c65562165b6e4f816e3b1d6c8ce944eb018a2349c34ce2e621984052bb59043cbb36cbca556e97643ff9fb4480a6bf44ad0a407bfc7e19

  • C:\Users\Admin\AppData\Local\Temp\syblzblz\syblzblz.0.vb

    Filesize

    354B

    MD5

    cbd19acde4ac544eac3527a58063aead

    SHA1

    c624df787a2e959374ef20fd45ba43d208b03a08

    SHA256

    8bb158c2882aed1697455d0c9c7d207f3459999859b75610297d562fc957248b

    SHA512

    c6f776fcd1c8d196a17c53c6602a4c5eafb08a3524ee6c880a01c2b44cbb3984bb324b0011378e3037759ab5eb52190542cc5d17e7e1657ab38307f2eb7a2e5e

  • C:\Users\Admin\AppData\Local\Temp\syblzblz\syblzblz.cmdline

    Filesize

    233B

    MD5

    37cbc0c64086bfc8a17221f6868a8ca1

    SHA1

    7ec1c3ed73c9685948ef6a918609df54d8c519ff

    SHA256

    2e73a4036c6477b8ea6e2e2ada5d74a872f50ae5adf99f543d744859a8c98599

    SHA512

    f2bee6ae71e9a2e8440aa893cc6c30ebea8753f40c62f0a6f4ab53d19ee315b70131000ddc63f0e059f11bbde03392a10490d70320b2d0b48c18e65451aa5d1a

  • C:\Users\Admin\AppData\Local\Temp\tmp4D40.tmp

    Filesize

    1KB

    MD5

    5c0831937ec05e8141e716f849236cf9

    SHA1

    f2c35693f0d6b5329e9437b994705e643d3de89b

    SHA256

    c027b726ed8f7996a44196f644055a812f0a5396f46b6be2c4eb61fa74f27ad8

    SHA512

    48b751d84539e09445256cf6996b5606691fc41603d2ebb258f61edb55257428dd7de96e88901f5b9af53eda384b476de5664e3b4d093fbabe1092739d1413a0

  • C:\Users\Admin\AppData\Local\Temp\vbc567555A56EEC4666A0465326D3E5E58A.TMP

    Filesize

    5KB

    MD5

    7cd17b72d4b450d2accbed00b638439b

    SHA1

    99e38c318a02f6e5f67ba6da1b439b4fca198135

    SHA256

    286717088aaa3ce520acbf380d839a2bcaf8e0b75a1ae5642e1e25259ba16d0e

    SHA512

    2102a72bf84b0bb6c90f2bf2ea92e7dd4802877e1bd0dd8f9f973c4f2a2cdc91f7d83e785f72d9c196df72c549b6be5c56b35c732754a995052cc1b60ede5c97

  • C:\Users\Admin\AppData\Local\Temp\vbc6A95CF3128E4319B3C04D5AE89F56A1.TMP

    Filesize

    5KB

    MD5

    64a4bf2b4ee70f258536b60909c9c9a0

    SHA1

    2d6c39f91360ea0440eff24a9125b1fcd381b80c

    SHA256

    5c10ea4aded1d4708bd0730dc3d0c8aff19a4775aced4e86f0c044c2e272712c

    SHA512

    c8b66605d44b12276ca9ffabd6df2e056cb86d16205b944d37e41bb1a28e02112d12f9edff3331ccf13746c6f1f90ba3713b53b4ed7a496863124ccffcb95698

  • C:\Users\Admin\AppData\Local\Temp\vbc6C0139A4FE8B47EBAD53EE1E5E21AAD.TMP

    Filesize

    5KB

    MD5

    a18cff3c7286b97a403335c18c289f05

    SHA1

    8c44ef5a894b4962e2f0b16a99886271b3adc169

    SHA256

    fa0243b1b21cd220d23d6951593260ce79870bcb148451e25346ac42f274fba4

    SHA512

    10bec313bb26bcac411c67983ff131dd9a80afe9cb823c1fc04b43d4eb9d5743e1ab471006f27100b6036ed1aa40627bc607fbd05f2c7f95a8f53b36aa41d086

  • C:\Users\Admin\AppData\Local\Temp\vbc92BEC823A1784029A24247415B11F3E1.TMP

    Filesize

    5KB

    MD5

    0b3f3cb94465b85bbcbb59a9f74a341b

    SHA1

    8d9b02891c2f9802b8b5672b26613e6ccfe00593

    SHA256

    91682de258c37b9daecbbbba23bd89cae72d3ae8ceb1d839fd7322cedb9fcc92

    SHA512

    048b97626c3d0f7d2e3804a8d621aba5c2e33452b66f145f6330d2f74d9648dab166afd337b2cfb33d62a1fa4b6cac83a2f5668a8eb9b42fa46fecfc930b401c

  • C:\Users\Admin\AppData\Local\Temp\vbc974519C82871448BAF7B541A709A8F57.TMP

    Filesize

    5KB

    MD5

    b1db73338187d1caa1bec9ad4d194ec5

    SHA1

    549db9f78838e57739c8f0df0bb80075c25d26c6

    SHA256

    c367aabbbbf3e29d791d105071dfb1e3940620475760edc87fbea0391d7fe0d2

    SHA512

    11c50231cc386f52d6ceb1b680fec8a64d2da8cc0377f59362f1e3e5652c617ce0341eb4f6817416cce354a359f7aaebb0806356db985a2b52068347b6a246c1

  • C:\Users\Admin\AppData\Local\Temp\vbcB190A1155758477FBD68466AACAFF53C.TMP

    Filesize

    5KB

    MD5

    77bdfcba78fb2d0a429ef6c09401aafd

    SHA1

    0b73f4317562491d7a0c5833f2faf10c5fdf2354

    SHA256

    439a3448e518cdace5d23a84361dc78fbe251fcdfd5a270cbe9e98fa690460d0

    SHA512

    c2aaf34787c15ade469cf994751d3887779e20923fe863e3bd094ac0d2bca87551d57e0804b733076888ed982ecc2e394f99f48f72612054e97d0e4ba536dc63

  • C:\Users\Admin\AppData\Local\Temp\vbcC63C577C879C4CCDAAA4484FB189D64.TMP

    Filesize

    5KB

    MD5

    396e6ac06b91c7f4a2533b1c8b372fea

    SHA1

    e63d038c44568bcdce53b0690ee24e7c208e852f

    SHA256

    db9d0d7f97b1c8dec09beb1dc44cc672a778742981b157eec4e5108f060290bf

    SHA512

    0d19305e996d46177110697b5452eff85e89cdc1a25cad9bd710811fbc8c262f0d676c2562df93eb9d7e7e8b7bf159b6ede219d0dadb5d9340e622b752425940

  • C:\Users\Admin\AppData\Local\Temp\vbcC96C77709120407A9FA1FC626E28689B.TMP

    Filesize

    5KB

    MD5

    3ee2fff02cbb4ace0b7175d108d71256

    SHA1

    593a487fd773e117adf57cb6ec4c7d9d4b22a1ff

    SHA256

    5b78c212d1eb39b2e663924084f8e0cbb830be547084203b22e454dc78d27272

    SHA512

    3018ee3dfe92d4aae56b4b60da301885db928ae2b93a68177b4a4d566c21331de531ca7c0b3c7d9dc9258c766ed1b468e11d2687401cfb8b49532d880814d429

  • C:\Users\Admin\AppData\Local\Temp\vbcCA65B12E9F0E44F6904BCEFF62F9BAFC.TMP

    Filesize

    5KB

    MD5

    6732dfd5c268207572bcf360e267c3ba

    SHA1

    6bf788b218aea9a26c0371a4887f65c20c96d418

    SHA256

    c2fdbeb4d6f71fc39e904b1a3fa11f732d412fbebee449b9813219b7d7f23a19

    SHA512

    e01e9f87ca4cc8e80da5873e904eb060e3768f6b98ebe4174d507c32acd245cc94425f8348dfdbe560722f7c826c5b5414551f4318d8a14b64631755d6e5b49b

  • C:\Users\Admin\AppData\Local\Temp\vbcCBFF3ABA962B493BB3A95B929D2C1C8.TMP

    Filesize

    5KB

    MD5

    649323e52b8072e29f63cd0f93e68ef9

    SHA1

    15a6288ebba94cec02b1793f388e8a23d394d3e8

    SHA256

    8e3dbb2dc5084375f6a512f5466955a1cbd3900b23be9c3bdc4b97879b8c236b

    SHA512

    4e29facd642b9c9f0058f3c9aaada12beb14b8bb78d3bd5268b72b8183e2cfa7281d19b6d810187b26d94fb2fa3d7516f3b966d8927468d2083d55445cc1c8a6

  • C:\Users\Admin\AppData\Local\Temp\vbcDE2026B630F446FBAE6E0EC403BB45C.TMP

    Filesize

    5KB

    MD5

    1a71f78236006684f850bf0dc8c92450

    SHA1

    c88c8c8cbd00afeb4f75e3a572f62f82f7f0a81e

    SHA256

    bc66594a9c4290beca9ff4298b4461155be24debe583e9ed3916630d4e493195

    SHA512

    bf2fe40bca0ed2f10b43e7a94516b05827dbf1221d3b3886adce29d7bc9212d69701c1e21a47266409b18bda80f0d316a7bdab0fff172afa0d863cfa9beec2bf

  • C:\Users\Admin\AppData\Local\Temp\vbcE2552FD17AEC41C794CBFAA262A940CD.TMP

    Filesize

    5KB

    MD5

    7f91de53fed017c2baf0813153f8405b

    SHA1

    79b6a3e7350e3c8d875c0d919ad20ac6ed65e549

    SHA256

    610335096ebcda7e029eb7822d9339c4e064df9140af2251641e80c038c3322b

    SHA512

    7b0d660fc352183fbc97a00ce8d8a7cfda683d0671f4e59de4e8a4d15eb4d668502a91e44e1907431410d6d60c662d393966fa1e831582f4bc2db4b00568a4f7

  • C:\Users\Admin\AppData\Local\Temp\xflcs4qf\xflcs4qf.0.vb

    Filesize

    374B

    MD5

    24e14059cb7f4e2a58dce1aa67672537

    SHA1

    56e5797141d987a2a88dbe63d950938905a68a1a

    SHA256

    a71494323e808a1283bf1632fb01d4c0076074ae1762530e2ed1dc4fc3cf0912

    SHA512

    7f684175a0f6f43d239bd668d7ebd824ea8fb257a0393ff65ee08d5379132276f36239a0fd5c70ed1eae4f88b8555aed1ce5e40cffe966fe77a839be6c8c907d

  • C:\Users\Admin\AppData\Local\Temp\xflcs4qf\xflcs4qf.cmdline

    Filesize

    274B

    MD5

    e73a30fc2e81dbf07372e2f18d72c0c4

    SHA1

    a9104ddd53c1a442835be999829532dbf791a2d3

    SHA256

    d72b089cbf6406742a8c37b125036a432e6ad050b8a0801eaff5ad0a87618c19

    SHA512

    e7175369500d40a544dd794000bf1638df8cc9c537d79b40e85bba5cbfc6d7f4573a128b29214d872035b416ac989cabb45c73f8a91c7f7ea1189ccbb21610dc

  • C:\Users\Admin\AppData\Local\Temp\z4tpyyhc\z4tpyyhc.0.vb

    Filesize

    372B

    MD5

    d7c72f7614d8c855f494e6d8e7460063

    SHA1

    897d9251014fe09cab4b09b18a72a2169954bfde

    SHA256

    cd2a52f07be9aeb0daed60624eb60a0688d067686dd86d7b6b1ad451b19b8a95

    SHA512

    b61d582b5146305d4361861eeaff1761dd5ad81e21317387109c74907f8dcc7b385dab5b24b7b14d2eec2a9452325fb7e7e18bd3ce83e225d54eaa37127391ed

  • C:\Users\Admin\AppData\Local\Temp\z4tpyyhc\z4tpyyhc.cmdline

    Filesize

    270B

    MD5

    dd22d8a5102005cf935b3bc24f1b5fb6

    SHA1

    8541685b0ff00f886ba401bf83bc273f46c4c6c1

    SHA256

    cf8fc6f1cb823f40ca8f27c105fd86adf29188e4b547c8c7dd86a67edcfb33e4

    SHA512

    63ba376d1c58716cfa1c169944438eb38c1e13e3031c001beff5a1c5f5a204f16b70b7f52083df64d336ab18564f4487b03e6963adc324e29fe2a871962bb410

  • F:\mswords\msword.exe

    Filesize

    959KB

    MD5

    2873ffc6801b6f646d9f14f339e7e550

    SHA1

    23329c57d5e345e5f5d5aff41164168e6e3228a6

    SHA256

    a303abeb45c17496d1134401d5f1e4e6804e6bf0ce192b28ec73951d1ee361c8

    SHA512

    16fdd7a22e01b5b5eb39b92c1ee96df0aa355a3a47d14f08ce887f3684cef65250d7675c035dab6de79054a0d39237746aa4aa67d055872643edb9753a9458cb

  • memory/2644-6-0x0000000006D00000-0x0000000006D9C000-memory.dmp

    Filesize

    624KB

  • memory/2644-4-0x0000000005820000-0x000000000582A000-memory.dmp

    Filesize

    40KB

  • memory/2644-1-0x0000000000B80000-0x0000000000C76000-memory.dmp

    Filesize

    984KB

  • memory/2644-19-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/2644-2-0x0000000005C40000-0x00000000061E4000-memory.dmp

    Filesize

    5.6MB

  • memory/2644-3-0x0000000005690000-0x0000000005722000-memory.dmp

    Filesize

    584KB

  • memory/2644-11-0x0000000009840000-0x0000000009898000-memory.dmp

    Filesize

    352KB

  • memory/2644-10-0x00000000071E0000-0x0000000007284000-memory.dmp

    Filesize

    656KB

  • memory/2644-9-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/2644-8-0x000000007527E000-0x000000007527F000-memory.dmp

    Filesize

    4KB

  • memory/2644-7-0x0000000005C10000-0x0000000005C24000-memory.dmp

    Filesize

    80KB

  • memory/2644-0-0x000000007527E000-0x000000007527F000-memory.dmp

    Filesize

    4KB

  • memory/2644-5-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/4288-21-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/4288-15-0x0000000000400000-0x000000000041E000-memory.dmp

    Filesize

    120KB

  • memory/4288-18-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/4288-20-0x00000000055B0000-0x0000000005616000-memory.dmp

    Filesize

    408KB

  • memory/4288-22-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB

  • memory/4288-335-0x0000000075270000-0x0000000075A20000-memory.dmp

    Filesize

    7.7MB