Resubmissions

01-02-2025 10:25

250201-mf4saszmgl 10

01-02-2025 10:23

250201-metkyaxqdt 10

25-01-2025 13:32

250125-qtfjeawpap 10

25-01-2025 13:32

250125-qtdptawpak 10

24-01-2025 13:12

250124-qfz1wszmcs 10

18-01-2025 16:31

250118-t1f1asxqft 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-01-2025 13:12

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1792
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\m_f02xgi.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE419.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE418.tmp"
          4⤵
            PID:2144
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\22i_rd-q.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1812
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE467.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE466.tmp"
            4⤵
              PID:1148
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tcobqvhr.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2892
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE4A5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE4A4.tmp"
              4⤵
                PID:2304
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hggxa-jo.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1988
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE503.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE502.tmp"
                4⤵
                  PID:1500
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bt0yzwaj.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1136
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE532.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE531.tmp"
                  4⤵
                    PID:1924
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\73zwct3t.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2556
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE58F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE58E.tmp"
                    4⤵
                      PID:1664
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vztathos.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1828
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE5ED.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE5EC.tmp"
                      4⤵
                        PID:1092
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fye9wgxl.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1328
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE61C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE61B.tmp"
                        4⤵
                          PID:2076
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gfgimxx2.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:540
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE65A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE659.tmp"
                          4⤵
                            PID:1632
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ypy6jjxi.cmdline"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:848
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE6B8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE6B7.tmp"
                            4⤵
                              PID:1572

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\22i_rd-q.0.vb

                        Filesize

                        266B

                        MD5

                        debab8fb1bbcbf74ca2ac313d4d5aa7d

                        SHA1

                        2a4058378b3df8ef9aa547d1511a425ef043d848

                        SHA256

                        0f1d45b4fd6c36693c7d96bda036a41dccffa4313b92940df6ad180982607744

                        SHA512

                        8beaad01c2f7541532842aca72324eeee7c582d50db2454bab3288dcb2922fdc1f2a0a3e2347a74e744e92c9f8304916c0f52a18754d2e3a5eb2fe6f9fbf6567

                      • C:\Users\Admin\AppData\Local\Temp\22i_rd-q.cmdline

                        Filesize

                        166B

                        MD5

                        2aaa926a5042c921d4408de1347fcbfc

                        SHA1

                        c303c7875d79fda99cac6379c1c69bcb51929294

                        SHA256

                        1294e323c4471525a8ef42cb58ebc3cd612ef3136f8ddda45d08c1de245c210b

                        SHA512

                        0a13c6f919386995b1265009887c6bbce55ae261f94d946a545281e171b754667e0f238b9c7a019414cfa388c4b01420f6df01c488682e68e6d371cee2c19b3b

                      • C:\Users\Admin\AppData\Local\Temp\73zwct3t.0.vb

                        Filesize

                        290B

                        MD5

                        ce1182df38f7b4c7a89d1e4d1886b0d8

                        SHA1

                        ba5cdc6e13b761912d14ec042639566eebc23eca

                        SHA256

                        e87616f590de6878e0a1051e52bb968d39bad4c7b086cdaecc064c6aa9582e3a

                        SHA512

                        7be8358cbcefde4b1e1a28480eaea0daf5bbbd25aba3d1bd8c589bad3adb63a90551830efabc6e0d2b01a406e41e44c5797502abc88566694fbff7c2091e05a0

                      • C:\Users\Admin\AppData\Local\Temp\73zwct3t.cmdline

                        Filesize

                        190B

                        MD5

                        1d4dc217104a082eae150db6a93cfdd2

                        SHA1

                        1b5d869e16842bebe26a18e731bae5d0a3eafa3a

                        SHA256

                        36d6bb8d9e0cad0d231fbde512f5179f1f7f9d8e5a2db93030b7fa829cd3d38d

                        SHA512

                        eb0d1fc952150e67087cc5df4c38b61c8b9a832bfb8234d0539f44991e3758961a186fe33a0f965cc2678edd351131fffb77e414c6ed4ab6fcd1edf477010a6c

                      • C:\Users\Admin\AppData\Local\Temp\RESE419.tmp

                        Filesize

                        1KB

                        MD5

                        e3ccdab1c829ba7f74ac8728598186f1

                        SHA1

                        3d9dc7b809a2d3ff252fdd203dc6a49ed9a1e3af

                        SHA256

                        e37fcc54103b2b343bc7772c212249e2603c95aee95730001df0c196db9594a2

                        SHA512

                        4dccf6629486c57a1a870d5e12948426e41968368671f8591f4b68a3cf7785d28c93509e1daae55c9ea844cb586c582266137af4f30ef710ea5cc9f30c27e572

                      • C:\Users\Admin\AppData\Local\Temp\RESE467.tmp

                        Filesize

                        1KB

                        MD5

                        ac426499045ed25252b95a23e41c3021

                        SHA1

                        02acc836591e81bfdd30bed2c1f4c24e35767437

                        SHA256

                        84893b6c048131bed73e607b491f08db154a42dac4d6cdc536d49e8de6cb0303

                        SHA512

                        83b4f6d88781cdaca1ff3f8cb54e2c2412e6f3999b52351a6881ec7657c1723d335fd64b0d31fb2a0567c73186bee27b6cd75a6809ef3fe7a2a84a8efc2cebcc

                      • C:\Users\Admin\AppData\Local\Temp\RESE4A5.tmp

                        Filesize

                        1KB

                        MD5

                        0c5f201ed4de185ae89ed4aaba12a508

                        SHA1

                        7bd89e93a9088b3b96d9f2db724c7bf5a2e1e700

                        SHA256

                        429b83f2ac0703451ab92c7f03d2dc86326bc5ed94ddf310dabfeabdb1646d99

                        SHA512

                        ac2e882124d6db9257fca056dd8dd9bd38963792dc3562b8abf9f7ce5aa21839a63f4fcd8cc42b93f56389565c497105e80fc9f8c45eadcc14f36bf9f402bb26

                      • C:\Users\Admin\AppData\Local\Temp\RESE503.tmp

                        Filesize

                        1KB

                        MD5

                        c32d9c73f6822649784f90a6d0fd6704

                        SHA1

                        e92c65cff580b2d182ce68099480c4ec88abc0b6

                        SHA256

                        92753f65d051146c4a20042ce1423ef789685b451e7211bbff3044992b939332

                        SHA512

                        a040a60d4849cdbbd528816d7d3948d86b9658c548bbc0ae45968296607961cc1351f470e1432098af9273d37a423d3adc413991c04806a5391f0ef56bc53240

                      • C:\Users\Admin\AppData\Local\Temp\RESE532.tmp

                        Filesize

                        1KB

                        MD5

                        79aca916c136c3dec52a7319acfa67e3

                        SHA1

                        0dcb1247d7a3aab5e843c67513d5a2b0e73eee29

                        SHA256

                        0ddeba523882a1ae54c6845decf0f6ee371c6757df1913b33c589074335df69d

                        SHA512

                        fbcc2a539d5b532d8d6534f867b7570dc83767f98ec8c41d6a469116c2c1bb6e9e758f2c34f514018ff4b3c3add183f325bcaa96cf4f749358109e6f6dc6aaa6

                      • C:\Users\Admin\AppData\Local\Temp\RESE58F.tmp

                        Filesize

                        1KB

                        MD5

                        c540daad26b45b3a9c19caeaae12d2a6

                        SHA1

                        20ccd5dd8c131a7480fe96e08eb28581451bffca

                        SHA256

                        bb122b6c4f222f341569e7343629cc3d9c21204c65a15b6cb780af8916546ef1

                        SHA512

                        1ff01f9413a1c1699a14ff918591a54d1fd9ecd3ce8bd716f4af733841cc9dafbd2946b88c4053130424e907a95b01467faa998a6caec55cfaab9df1888bbdfa

                      • C:\Users\Admin\AppData\Local\Temp\RESE5ED.tmp

                        Filesize

                        1KB

                        MD5

                        bb8d0d434a537b8a368a51be32e4dba7

                        SHA1

                        5da2655efc6754a850420ab9867cceb86c3e908a

                        SHA256

                        9be5482968bbf7cee91910ad4efc9c75ea2975763e0e1db82998ca59b59a7cc0

                        SHA512

                        4c3109fe793b5e8e3bda52770bc35cf08be2d2941c3eca0c117fdba10d1e44b63ad139724245e15e6f078079d9d224b52bbb6f9027c7ebc7c6eedf90804b07eb

                      • C:\Users\Admin\AppData\Local\Temp\RESE61C.tmp

                        Filesize

                        1KB

                        MD5

                        06400253a97f08048faf2f841b7ff817

                        SHA1

                        21bab6ead7abab67d17d63357b12b84b789638b1

                        SHA256

                        941cbb3f5683bab8846fd5e37ebcc588d565197bf93b681ce76142af718fc075

                        SHA512

                        92759cce86905608bd7e01448b6fa635e062aa2ee14f7865f12fbaa8fc4e634ec6cdc9fdcda1608a0e66ec310ea8a5f2264f213acb52e5011a8a451289fa8978

                      • C:\Users\Admin\AppData\Local\Temp\RESE65A.tmp

                        Filesize

                        1KB

                        MD5

                        d137d0af3445b18882c5e7c36fbbc1cd

                        SHA1

                        c4fe75792977761b2477d4cc18a14400cf107107

                        SHA256

                        ab3aebb1131a3c55c98e84bd148abc95e2bd61e11486c54033f58c8a5f09dbe5

                        SHA512

                        3e4e36b7320910edd0b836fd88ca4faa94d6eaf1b67574152575472f420cfc6a96e2b222f2366a83ac0fc06476ab1794fd1d266bcc0bbdbd89b3010ea9cfeffd

                      • C:\Users\Admin\AppData\Local\Temp\RESE6B8.tmp

                        Filesize

                        1KB

                        MD5

                        f60c34becd118e2b7f0eba825392d2f3

                        SHA1

                        43c84ba9310e89bd95c14101dc5a2dad126fce50

                        SHA256

                        e247098564e90f540274325d940d9621d71d4e48f49e7a2e6e286fceb3674300

                        SHA512

                        b384f112cb44b817c0730d66df47b26971c8fbc75204b1e12995deb2edb434bcd7c4a3c47b6a99b2abc51301810419c91cb8739859746416f16afa1fde1d30a7

                      • C:\Users\Admin\AppData\Local\Temp\bt0yzwaj.0.vb

                        Filesize

                        271B

                        MD5

                        ac972015bef75b540eb33503d6e28cc2

                        SHA1

                        5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                        SHA256

                        fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                        SHA512

                        36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                      • C:\Users\Admin\AppData\Local\Temp\bt0yzwaj.cmdline

                        Filesize

                        171B

                        MD5

                        8b59ecf90e8770888dd902eecf184ed6

                        SHA1

                        2eda9130968c6420be2bc113f747e2c689d7c5b7

                        SHA256

                        19a49249fe5ac02aa6cf3f2de4ad63b2e97bd1be2de62f48d2882b30e99c0938

                        SHA512

                        d8a3535e466a0ad77e71a1a9e883cf7b2f159920938c0bfae590257586932b3d27e83bf053a938647ca1b3cb41daed7eedc693b1ce6e62037214c0943027dd01

                      • C:\Users\Admin\AppData\Local\Temp\fye9wgxl.0.vb

                        Filesize

                        264B

                        MD5

                        5ce3977a153152978fa71f8aa96909e9

                        SHA1

                        52af143c553c92afc257f0e0d556908eaa8919cb

                        SHA256

                        e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                        SHA512

                        eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                      • C:\Users\Admin\AppData\Local\Temp\fye9wgxl.cmdline

                        Filesize

                        164B

                        MD5

                        f48cc8ff453a405f3c2fabfaecf64420

                        SHA1

                        b4f60b6c6e482eb31bf35a1d4bd97f7577b3541f

                        SHA256

                        e5ddf13225def8658ea5d52053b697d64d542b4f63be51b0f5611c0f94f1c359

                        SHA512

                        1a89be938f85ee93db08be4fad024a106a4d2bbe16c26fa822f6a916f999b3db890ed3cc879fc2a9c45cf3d4e0fd32b2f24185a93c517cf6f84f6cf29a475556

                      • C:\Users\Admin\AppData\Local\Temp\gfgimxx2.0.vb

                        Filesize

                        270B

                        MD5

                        658573fde2bebc77c740da7ddaa4634b

                        SHA1

                        073da76c50b4033fcfdfb37ba6176afd77b0ea55

                        SHA256

                        c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                        SHA512

                        f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                      • C:\Users\Admin\AppData\Local\Temp\gfgimxx2.cmdline

                        Filesize

                        170B

                        MD5

                        560e397710c8f4a697dbe64252c1178f

                        SHA1

                        f905a1156f64f15755116f9ac81cde9cad4cfc3d

                        SHA256

                        844bfa6e61cc74f42a2a133d5fc5348a849effb0c95cc873e9daba6640fec3c8

                        SHA512

                        b2f4b58e85afadccb8f5463a8ee56736a170ece20a9641176fe679297e9a7ba6e00a6b8767850cc1a897e2fa97d7f32f9a711630afb8106b41d5e356ad54cdeb

                      • C:\Users\Admin\AppData\Local\Temp\hggxa-jo.0.vb

                        Filesize

                        269B

                        MD5

                        d8ec3923c7b4bf7ae4ba2dd32ba5174f

                        SHA1

                        bd232f852b5428b0360c9708604793deb513c36e

                        SHA256

                        316f5f33d99324745cbdad4dfe3ece93321e270a177f3646d78d72d1f7a1d648

                        SHA512

                        062694e7951b534e5c93d4d2e65c65cc59b9be7f3f1e469b1679d61e03f1770246222009461c6e2a8ddfe41fa367ed6ebd83f53e0a1c3f24db5e97932558ce11

                      • C:\Users\Admin\AppData\Local\Temp\hggxa-jo.cmdline

                        Filesize

                        169B

                        MD5

                        c80a35180e162cb5a95ab11bc16928e3

                        SHA1

                        bd827c0aae24f925af9a98086795d6a026f4a1ad

                        SHA256

                        d6e82b72357d099a4b561b10378c239ea2695763b4835a9be5b869996b3906d2

                        SHA512

                        9016c8a0036120b3439f3e65322c6ea7092a4d992bf54fec505ea4e60896928b0f123e97761eff9a29548476a0d3f7cf833af6b5d7dc4034369fc23a62fdf0c7

                      • C:\Users\Admin\AppData\Local\Temp\m_f02xgi.0.vb

                        Filesize

                        262B

                        MD5

                        88cc385da858aaa7057b54eaeb0df718

                        SHA1

                        b108224d4686b5ca3faaeb1c728dfba8740a6eca

                        SHA256

                        08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                        SHA512

                        4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                      • C:\Users\Admin\AppData\Local\Temp\m_f02xgi.cmdline

                        Filesize

                        162B

                        MD5

                        f8153bda12e4a6c3fe05471260817d6a

                        SHA1

                        fa710e47716e500ccf055db18e69eaeed579d1d9

                        SHA256

                        a2504cf525a24f57aacb1db114aaf0d79b1f6999a049186672043ef75edf4573

                        SHA512

                        baa1cb105725d500399675e8827895ade70b4122e77f8f6b52ce883d155af8793c5e5406bc85c36815aa06ee58ba173b9386c66ba5104d81ecb15430f56b3002

                      • C:\Users\Admin\AppData\Local\Temp\tcobqvhr.0.vb

                        Filesize

                        265B

                        MD5

                        cbdf61e7858f1274d58258756e185765

                        SHA1

                        15f0d177b5924a5176ff82f0b79bfa3db558145c

                        SHA256

                        d0aa53536d1316c420848db8bb089b24f9669f1baf3be092a7e0f0a0bc1b997d

                        SHA512

                        ab21cbb170e38a2600db2587ce92b74499107e361d55bbcd5e6281568307ffb1c087aba905c042e2e8960e2e554c84057a197dc4c03121b682868def94c5a038

                      • C:\Users\Admin\AppData\Local\Temp\tcobqvhr.cmdline

                        Filesize

                        165B

                        MD5

                        9d624a2b6b9d55bb26f3808ac827315c

                        SHA1

                        3852c557e9485c20bb721e8edc5ef19402e80f84

                        SHA256

                        629d05dbc50b7f5db0cbd5f47c62f9ced3ef82c0dc6b9264b5d7631a29228965

                        SHA512

                        6099d38441e79ec50495e0a5b26a9d9a04ac7b6bd34062c77eab8df6cc2aec2d6d639f8f0b68aa7234930405fc7985008ed03248bb49fcc05c30117740a8c858

                      • C:\Users\Admin\AppData\Local\Temp\vbcE418.tmp

                        Filesize

                        668B

                        MD5

                        3906bddee0286f09007add3cffcaa5d5

                        SHA1

                        0e7ec4da19db060ab3c90b19070d39699561aae2

                        SHA256

                        0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                        SHA512

                        0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                      • C:\Users\Admin\AppData\Local\Temp\vbcE466.tmp

                        Filesize

                        684B

                        MD5

                        41857ef7e71c255abd4d5d2a9174e1a6

                        SHA1

                        95051d6ae43ff1bd9e5ebc95aa2e7b7c3165cb6c

                        SHA256

                        dfcdf12316f3b523895ec611d8e8d9fdc189ab8dde4e86fb962541aeac54e302

                        SHA512

                        ec6c5a7729d273be3ff194ffe47056731ab4100e298b7f50108a2599be59c84bd1953a90c4d7390c477257986a18d336d951f590b782f1aa983de7bd4c86e6ac

                      • C:\Users\Admin\AppData\Local\Temp\vbcE4A4.tmp

                        Filesize

                        684B

                        MD5

                        453916f7e3952d736a473b0e2eea5430

                        SHA1

                        b79ccb2b555a81b8db470ec9fcaea26d42ef1c8b

                        SHA256

                        b0f8b94a35a12060c70e9f81641be22cbf1f1794c73260f48a2e6e46608623fe

                        SHA512

                        86d32a03cf04ef8640075c82e5fecb23034413a41b80b81c900a423b03f44589f774f68f83561465e7c9ce46512c818eef5a90e5ed9f7b3f86b592be34fa367f

                      • C:\Users\Admin\AppData\Local\Temp\vbcE502.tmp

                        Filesize

                        700B

                        MD5

                        6ed26221ebae0c285cdced27b4e4dbac

                        SHA1

                        452e9440a9c5b47a4f54aefdde36c08592e17a38

                        SHA256

                        aacdfb10fa949c74577bb1778fe2f3bab88b3e587c07cfffb003e059097e9e6c

                        SHA512

                        c604368a7b4adfbec5b6898c8880ea684bd085d967c1ebd087c9bed065fe3e2575c8298a9ccaa454d68496386667db998e2a04248dda2ab35905c8a9b1135cce

                      • C:\Users\Admin\AppData\Local\Temp\vbcE58E.tmp

                        Filesize

                        748B

                        MD5

                        b548259248343e12d417d6c938cf8968

                        SHA1

                        19703c388a51a7ff81a3deb6a665212be2e6589a

                        SHA256

                        ab2ce0a14c78f836d2b134a37183b6d89a78b964ea5607940fa5d940d32a0366

                        SHA512

                        73a3902f000a042a448446f6851d6ad61a30bfdfed7d7903b5dad0f368ee43cd6da3b8ba817ac95be1a7427902aba0642af8ccddc4d442867465f1f1f5bf6f81

                      • C:\Users\Admin\AppData\Local\Temp\vbcE5EC.tmp

                        Filesize

                        676B

                        MD5

                        ba2c43095c1c82b8024e968d16bee036

                        SHA1

                        41ea006dbc9f0f6e80941d7547a980a1dde868e0

                        SHA256

                        1209067183104b41f03a5be0f377dc1865155cc84bdb509b871b7ce3366aae72

                        SHA512

                        00dc93cdb8c4cb0a681f99d24c59216a721bce963d76bad972e29cf92aafd74e4af46632c00f5aef4ce3160927db9df8aa9a8926ea4a5cb6974b499785569e61

                      • C:\Users\Admin\AppData\Local\Temp\vbcE61B.tmp

                        Filesize

                        644B

                        MD5

                        dac60af34e6b37e2ce48ac2551aee4e7

                        SHA1

                        968c21d77c1f80b3e962d928c35893dbc8f12c09

                        SHA256

                        2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                        SHA512

                        1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                      • C:\Users\Admin\AppData\Local\Temp\vbcE6B7.tmp

                        Filesize

                        684B

                        MD5

                        7a707b422baa7ca0bc8883cbe68961e7

                        SHA1

                        addf3158670a318c3e8e6fdd6d560244b9e8860e

                        SHA256

                        453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                        SHA512

                        81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                      • C:\Users\Admin\AppData\Local\Temp\vztathos.0.vb

                        Filesize

                        271B

                        MD5

                        b19384e98248a2c238e2360d2fecf049

                        SHA1

                        25f5ab6303d0a81f4ef3cc44c0bb53dd3e564fad

                        SHA256

                        296feb4019e37af5174b813d3ac19fa1b17c4db9ad91b06eba610939983e3262

                        SHA512

                        e9e4dd4a302d643fd1d0dd46d058ca7a45c8e6d8b299c129e1a412d1d3309cfe4d4da6f9d893460dde7e96c40414d65e02dbab9c1411dd945581e749ae8438e4

                      • C:\Users\Admin\AppData\Local\Temp\vztathos.cmdline

                        Filesize

                        171B

                        MD5

                        18b2eb2f7b283985fd505a8ab95d3b79

                        SHA1

                        91e6ed0f10be2f4d29cff1a8ccf7fb469afb1d61

                        SHA256

                        811490499c47a4e05e63508c827e9e27b7aea6c7c16ed88bc1837fd39f595610

                        SHA512

                        e4af26f8e5d010a12524b89b3a9190b2fe932b5005bebee61a813264eb3b7f66e8eeedf18e7e03be7595c621f71f892bfd8152463590d6255ab97df0c470e181

                      • C:\Users\Admin\AppData\Local\Temp\ypy6jjxi.0.vb

                        Filesize

                        273B

                        MD5

                        3c3d3136aa9f1b87290839a1d26ad07a

                        SHA1

                        005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                        SHA256

                        5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                        SHA512

                        fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                      • C:\Users\Admin\AppData\Local\Temp\ypy6jjxi.cmdline

                        Filesize

                        173B

                        MD5

                        6d75fba7b71ff901c2a542e00e5ed525

                        SHA1

                        06f2ce179530692f504ad4d628284d0c447b51bf

                        SHA256

                        a06364e14aa36720f61245765dca3ff6030bf23996877ccf77afdb680b53bea6

                        SHA512

                        49287e94ad54995dc55ad8014663406da5baf563ba5e9745d9832ace431d292e2522da210a8fabc652c98e6a622f9de9209fa01f1c651b54eddd78218a94d00c

                      • C:\Windows\System32\MSSCS.exe

                        Filesize

                        21KB

                        MD5

                        6fe3fb85216045fdf8186429c27458a7

                        SHA1

                        ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                        SHA256

                        905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                        SHA512

                        d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                      • memory/1260-13-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/1260-4-0x000007FEF630E000-0x000007FEF630F000-memory.dmp

                        Filesize

                        4KB

                      • memory/1260-3-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/1260-2-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/1260-0-0x000007FEF630E000-0x000007FEF630F000-memory.dmp

                        Filesize

                        4KB

                      • memory/1260-1-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/1792-25-0x000000001B7F0000-0x000000001BAD2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/1792-26-0x0000000001EE0000-0x0000000001EE8000-memory.dmp

                        Filesize

                        32KB

                      • memory/2876-12-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2876-14-0x000007FEF6050000-0x000007FEF69ED000-memory.dmp

                        Filesize

                        9.6MB