Resubmissions

17-01-2025 20:27

250117-y8gzsasjhw 10

17-01-2025 10:48

250117-mv59nsvlbr 10

14-12-2024 07:51

241214-jqcj1sxnhr 10

11-12-2024 15:39

241211-s3498stkar 10

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    17-01-2025 20:27

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Extracted

Family

revengerat

Botnet

XDSDDD

C2

84.91.119.105:333

Mutex

RV_MUTEX-wtZlNApdygPh

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3616
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tpzifmiw.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3016
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBD9E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC703CC579624A8583BD8E2118D514B.TMP"
          4⤵
            PID:1368
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zraiqsqv.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1160
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBE98.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD9F48AE5CE7B44FA99C1BF343E334E.TMP"
            4⤵
              PID:348
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\t5rbhd3l.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1760
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBF44.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE3EAE56047064BACB6DC7BAE4EA41B0.TMP"
              4⤵
                PID:3984
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qs3c8vwf.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2800
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBFD0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC717E2E7D8048D39647EADA8377067.TMP"
                4⤵
                  PID:856
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ekxuzzsd.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1304
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC03E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEECAA6C331A54016B6AA42A66730658F.TMP"
                  4⤵
                    PID:4348
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vtyhkhgw.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1176
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC0AB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFDCCF0C6457440379020C4B66192C9.TMP"
                    4⤵
                      PID:4932
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yq2rer7s.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2468
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC119.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc83343CA21804404A81FC449D205A20BA.TMP"
                      4⤵
                        PID:4496

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\RESBD9E.tmp

                  Filesize

                  1KB

                  MD5

                  97f2514af477843b56cddcf02230b86d

                  SHA1

                  3d13f21759e756a79ec6adcda312ef2ef37fc47b

                  SHA256

                  1246dd2e5a6e735a9e6515a563d7a9e75c0cdf820c1c0b8cf389f155067f2ff8

                  SHA512

                  3e0a473f74bd99a5b88acd161d7689eeb09331a3e4cd933f0806103c2937eebb888f20983420b12f7eab8ac12104c3e86cfeb4ef739a24af5a1c909818c63471

                • C:\Users\Admin\AppData\Local\Temp\RESBE98.tmp

                  Filesize

                  1KB

                  MD5

                  facdc313359bedc9c50e928c8debde3b

                  SHA1

                  6b3de44124307abcbea0ece6fd3b61b8de341c47

                  SHA256

                  6d7367c47c01ff74f9db624cd1a36bf818521268cc18c990c0e001595e9f0eba

                  SHA512

                  b78df64e1e346c8c1aa239e03ecf62b58e5b102fe344f023f61be78120bf9b0dd34b6a9e417952c8670967e9a5f246a3a5232a04e39e63510df317b2491be413

                • C:\Users\Admin\AppData\Local\Temp\RESBF44.tmp

                  Filesize

                  1KB

                  MD5

                  0eb722f53d64430c47bc1ac320304e01

                  SHA1

                  8d6ef74e3da93d7fad0a5d81de11d36c740c03f8

                  SHA256

                  1974b4b8df4977fea44c8d6ec9336bd181a8f25d900052bac3f87553a00c2f75

                  SHA512

                  0b893f49d58cb832d3bae985323de6800a16cec5bbe113d58b34a49eb6dd0fccc39ff7d9778ae94bbb0c1d4e5dd4d06697600600672db02f843701fdf10bc86c

                • C:\Users\Admin\AppData\Local\Temp\RESBFD0.tmp

                  Filesize

                  1KB

                  MD5

                  979cc38958492d5e1973e1d2a2e0ebd5

                  SHA1

                  e359781751eff1c971e9dba6e566d451af8cf5fd

                  SHA256

                  2d31e7ca4c2210841030ce3739acd081c3cb36ee53045770aeb544d0845c6ef4

                  SHA512

                  d80b27cc3a56256d3b4b22af021409b05b88dfc8af420c184a73d37a28de4de235c6fb684b61f4e8f0fa4e39354afb4198095c9d0afac185ff7fb0ad6c47b74c

                • C:\Users\Admin\AppData\Local\Temp\RESC03E.tmp

                  Filesize

                  1KB

                  MD5

                  58109c4a3eb4d1742732612a3d15e886

                  SHA1

                  30d2e6591505e9efb08dc28959b0ce96669503d0

                  SHA256

                  f9aa194136d99d65bf0e1e7611839bf4ee910a51776f6df4ea0f2c9d3697f5db

                  SHA512

                  0268113276c252efb06d2c3341db4f9cf32b4f54dcfd2fa028b75883ae9ac12bca22a698305e7d8bd782117912e18e65ddf3b448b22d4a978f5fe37a26377780

                • C:\Users\Admin\AppData\Local\Temp\RESC0AB.tmp

                  Filesize

                  1KB

                  MD5

                  38d9fd3f65413702652850f853218a82

                  SHA1

                  f21e73caaddbed2320b25a3da535a1e7a5ad56fe

                  SHA256

                  3c054ec3893eef7db45d2901fe9cb599e0b0d95ec58cd038fe546936e1b1d2fa

                  SHA512

                  b379655688bce9e3e4d13d1092bcdf887b54b7c60c503f6f3e49c73cd432dfdc1bee31cb0b94f5a4cbef0100d32991d25f7e4f4501dd3289a476a26fd5a47e64

                • C:\Users\Admin\AppData\Local\Temp\RESC119.tmp

                  Filesize

                  1KB

                  MD5

                  ddde09b192ebf0017fd564405d9cb6e9

                  SHA1

                  9910d13f4f56bd90bcf03e1d1852a3f1fae1b490

                  SHA256

                  28398ede0ff2900c7702d92e00a728cac4b943885a176b444690d7227d2f57fd

                  SHA512

                  4e689108877a8d4084f3d4524c16ae6d379e9b84da392ffb3a7409f883c9b11a3949dbde76f630d2e52d03094b2d82b961fb6e81dbc8af404e0ecdb9cb5b069d

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ksefiqvl.0wy.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\ekxuzzsd.0.vb

                  Filesize

                  264B

                  MD5

                  5ce3977a153152978fa71f8aa96909e9

                  SHA1

                  52af143c553c92afc257f0e0d556908eaa8919cb

                  SHA256

                  e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                  SHA512

                  eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                • C:\Users\Admin\AppData\Local\Temp\ekxuzzsd.cmdline

                  Filesize

                  164B

                  MD5

                  7c45d42bac24d5df1bf24c4186d1ef76

                  SHA1

                  ebb256476025399953446f1a6066b654edf53aaa

                  SHA256

                  4a4f3375aa41389406c67ee49a23f988097b3c032de4a83ef6ed24a67b097206

                  SHA512

                  db34c1b735c965918290707b4f65817412b260d2b8f0b30f27b9d0e28178c39a60daed1652077157f066a02062c56b0f6941f06c8ffbbb73d60b076ac006c52e

                • C:\Users\Admin\AppData\Local\Temp\qs3c8vwf.0.vb

                  Filesize

                  274B

                  MD5

                  539683c4ca4ee4dc46b412c5651f20f5

                  SHA1

                  564f25837ce382f1534b088cf2ca1b8c4b078aed

                  SHA256

                  ec2210924d5c1af6377ef4bdf76d6ca773aaa1ae0438b0850f44d8c4e16ef92e

                  SHA512

                  df7c1a55e53f9b9bf23d27762d2d1163c78808e9b4d95e98c84c55ca4ecb7009ed58574ae6ddede31459f300483a1dc42987295a04f6c8702f297d3f1942f4ac

                • C:\Users\Admin\AppData\Local\Temp\qs3c8vwf.cmdline

                  Filesize

                  174B

                  MD5

                  84a159c998374cae1008e48617e5b087

                  SHA1

                  0fe2c10d4623fa39fda53d83c33fa9ee2f4a3c5d

                  SHA256

                  7831cbc49977d298eb523e45890efd7b1fac0f27e00e183b29fd1d6d1ec0ac9b

                  SHA512

                  489825e53be7a1c7d4eda9bb86d5dbd934b0f057e987e43ae1b956bbc0edb649d6ca9630a81ee67c98115443845c17846fed2e92acca6fa90d4a132333dda997

                • C:\Users\Admin\AppData\Local\Temp\t5rbhd3l.0.vb

                  Filesize

                  272B

                  MD5

                  2b3aac520562a93ebef6a5905d4765c9

                  SHA1

                  10ab45c5d73934b16fac5e30bf22f17d3e0810c8

                  SHA256

                  b9f0edf067faaaa7da2d47e3d22b957cd302eb25e01e08ea79c664868f328f89

                  SHA512

                  9514934ed12d93ea3ad4e6873cf294bafa114bc7a784a93b14dd2410d07fae3a2c00308035a5c129c57e283de8b94ed36fd9f9de35b08eb79a82a0c732e50446

                • C:\Users\Admin\AppData\Local\Temp\t5rbhd3l.cmdline

                  Filesize

                  172B

                  MD5

                  7ffdd85b32c24bdc7ca7b80e58e94e07

                  SHA1

                  8d0443c4ff0600d2cdb753751aaf7982749d2756

                  SHA256

                  3ce69c9fbdf9066ed0108013fd138f92f5a84ad4ea037cc1dbbf47ec3e2af5fd

                  SHA512

                  5722fd4959812f22c3378986c95b6ef41eeaf0d15d18b673967fc51d23886b1dcb06d14eed603e1cde6711531e6da82d9e3b2e79e5fe7a619ddf3fb655dcd1aa

                • C:\Users\Admin\AppData\Local\Temp\tpzifmiw.0.vb

                  Filesize

                  256B

                  MD5

                  076803692ac8c38d8ee02672a9d49778

                  SHA1

                  45d2287f33f3358661c3d6a884d2a526fc6a0a46

                  SHA256

                  5b3ab23bcadaeb54a41bdb1636bcaf7772af028d375f42baeb967de6579ef2a3

                  SHA512

                  cc9126384a287ccb99d10d5c2d3034cdbc8a45e94f1cec48dd95f2aa08ebbe3053ffd6d6effa31f2d84164edbb6136398cd02c08b05f027a6a777dffd1daea5d

                • C:\Users\Admin\AppData\Local\Temp\tpzifmiw.cmdline

                  Filesize

                  156B

                  MD5

                  1885c4359b3f4f0dac196349885e811e

                  SHA1

                  73705ee954e162a7b6e9e4a4feb7c0ddac7c0440

                  SHA256

                  7c0ddf764f36632d7d7cc2ea2542d4e4f655ac17ba2b882abe0fa1958dddf9d2

                  SHA512

                  4d3b9d5a51f1bdb2d56987828264b280f0d8008d61b0507f393195f93b0d3a5d190fc71677205dc0b7fef476f2698bdf6e577b4543ec69c59ac96e7d7a8de3e0

                • C:\Users\Admin\AppData\Local\Temp\vbc83343CA21804404A81FC449D205A20BA.TMP

                  Filesize

                  684B

                  MD5

                  7a707b422baa7ca0bc8883cbe68961e7

                  SHA1

                  addf3158670a318c3e8e6fdd6d560244b9e8860e

                  SHA256

                  453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                  SHA512

                  81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                • C:\Users\Admin\AppData\Local\Temp\vbcC703CC579624A8583BD8E2118D514B.TMP

                  Filesize

                  644B

                  MD5

                  dac60af34e6b37e2ce48ac2551aee4e7

                  SHA1

                  968c21d77c1f80b3e962d928c35893dbc8f12c09

                  SHA256

                  2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                  SHA512

                  1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                • C:\Users\Admin\AppData\Local\Temp\vbcC717E2E7D8048D39647EADA8377067.TMP

                  Filesize

                  684B

                  MD5

                  8135713eeb0cf1521c80ad8f3e7aad22

                  SHA1

                  1628969dc6256816b2ab9b1c0163fcff0971c154

                  SHA256

                  e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a

                  SHA512

                  a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4

                • C:\Users\Admin\AppData\Local\Temp\vbcD9F48AE5CE7B44FA99C1BF343E334E.TMP

                  Filesize

                  668B

                  MD5

                  3906bddee0286f09007add3cffcaa5d5

                  SHA1

                  0e7ec4da19db060ab3c90b19070d39699561aae2

                  SHA256

                  0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                  SHA512

                  0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                • C:\Users\Admin\AppData\Local\Temp\vbcE3EAE56047064BACB6DC7BAE4EA41B0.TMP

                  Filesize

                  676B

                  MD5

                  85c61c03055878407f9433e0cc278eb7

                  SHA1

                  15a60f1519aefb81cb63c5993400dd7d31b1202f

                  SHA256

                  f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b

                  SHA512

                  7099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756

                • C:\Users\Admin\AppData\Local\Temp\vtyhkhgw.0.vb

                  Filesize

                  270B

                  MD5

                  658573fde2bebc77c740da7ddaa4634b

                  SHA1

                  073da76c50b4033fcfdfb37ba6176afd77b0ea55

                  SHA256

                  c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                  SHA512

                  f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                • C:\Users\Admin\AppData\Local\Temp\vtyhkhgw.cmdline

                  Filesize

                  170B

                  MD5

                  ad2ba514e4c48f8f3854efcd2c6ca4bd

                  SHA1

                  25bb650f9d1ca8516b774e9a76dcb935096bba52

                  SHA256

                  dc9d1630bcd764d2874c5170c57fd97937e686dc162bd818017cde5e4e3a90d5

                  SHA512

                  ddc5cdb36c2bb1dfdad33f6b55d248f6c1529f64486b17d5e035d0f5430c694fdfec3afbf2874ed0d83dce428afd93ed75b7ea2ccf53f8c871bd4205305ad6a7

                • C:\Users\Admin\AppData\Local\Temp\yq2rer7s.0.vb

                  Filesize

                  273B

                  MD5

                  3c3d3136aa9f1b87290839a1d26ad07a

                  SHA1

                  005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                  SHA256

                  5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                  SHA512

                  fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                • C:\Users\Admin\AppData\Local\Temp\yq2rer7s.cmdline

                  Filesize

                  173B

                  MD5

                  d361224b892ceee3670bebac6bdf39a6

                  SHA1

                  56df5f4df9fd89bb6bbfefb85a078e3fac332f2d

                  SHA256

                  37eb70815dc6fce5320d53b8f7ef78ede845f284c94c46b8dd20313a9086c91f

                  SHA512

                  7214919954e3e3dc747d6f94ec7652aee76d9c98e299d72c6a1c7894789cb7fc0cd42b9582859172cd75b3e331f3feef2788d61675b098563efe5f989265af41

                • C:\Users\Admin\AppData\Local\Temp\zraiqsqv.0.vb

                  Filesize

                  271B

                  MD5

                  ac972015bef75b540eb33503d6e28cc2

                  SHA1

                  5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                  SHA256

                  fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                  SHA512

                  36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                • C:\Users\Admin\AppData\Local\Temp\zraiqsqv.cmdline

                  Filesize

                  171B

                  MD5

                  361bbc14ccd0e32b33fa0743020b8b19

                  SHA1

                  c05e8f9427992aa47f29dfcb05e69b2ba69cd143

                  SHA256

                  e48647a877022cddb13529f9a7514fa3d2831f3ce1089b7c90a5cf9cf9edf92d

                  SHA512

                  efde038a15185ef01be8d55dcb386ffcb31f2de9194c4839f638a34ead4fee8d51d81c7f2e089752c0a48a2f39a67fb36f0ddbe7e98e5bd438f6992c0cef76ee

                • C:\Windows\System32\MSSCS.exe

                  Filesize

                  21KB

                  MD5

                  6fe3fb85216045fdf8186429c27458a7

                  SHA1

                  ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                  SHA256

                  905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                  SHA512

                  d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                • memory/1052-31-0x000001BAA1C20000-0x000001BAA1C42000-memory.dmp

                  Filesize

                  136KB

                • memory/1504-14-0x00007FFE9F900000-0x00007FFEA02A1000-memory.dmp

                  Filesize

                  9.6MB

                • memory/1504-7-0x00007FFE9FBB5000-0x00007FFE9FBB6000-memory.dmp

                  Filesize

                  4KB

                • memory/1504-1-0x00007FFE9F900000-0x00007FFEA02A1000-memory.dmp

                  Filesize

                  9.6MB

                • memory/1504-6-0x000000001D140000-0x000000001D1DC000-memory.dmp

                  Filesize

                  624KB

                • memory/1504-5-0x00007FFE9F900000-0x00007FFEA02A1000-memory.dmp

                  Filesize

                  9.6MB

                • memory/1504-4-0x000000001C810000-0x000000001C872000-memory.dmp

                  Filesize

                  392KB

                • memory/1504-3-0x000000001C6F0000-0x000000001C796000-memory.dmp

                  Filesize

                  664KB

                • memory/1504-0-0x00007FFE9FBB5000-0x00007FFE9FBB6000-memory.dmp

                  Filesize

                  4KB

                • memory/1504-8-0x00007FFE9F900000-0x00007FFEA02A1000-memory.dmp

                  Filesize

                  9.6MB

                • memory/1504-2-0x000000001C170000-0x000000001C63E000-memory.dmp

                  Filesize

                  4.8MB

                • memory/3616-10-0x00007FFE9F900000-0x00007FFEA02A1000-memory.dmp

                  Filesize

                  9.6MB

                • memory/3616-11-0x00007FFE9F900000-0x00007FFEA02A1000-memory.dmp

                  Filesize

                  9.6MB

                • memory/3616-13-0x00007FFE9F900000-0x00007FFEA02A1000-memory.dmp

                  Filesize

                  9.6MB

                • memory/3616-15-0x00007FFE9F900000-0x00007FFEA02A1000-memory.dmp

                  Filesize

                  9.6MB