Resubmissions

08-02-2025 06:10

250208-gw53ea1mhp 10

01-02-2025 10:25

250201-mf4saszmgl 10

01-02-2025 10:23

250201-metkyaxqdt 10

Analysis

  • max time kernel
    144s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2025 13:12

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:556
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\iriesckv.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1540
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC89.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAA957D6DAFD94D8790E4893C34CF8055.TMP"
          4⤵
            PID:1064
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dsctjgp4.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:972
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD83.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc393F3E0D1568479B82F02F516970D1D0.TMP"
            4⤵
              PID:3736
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ucadub2y.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4912
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE6D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD01C2A76D59F42E5BCE4FA30B318FCDD.TMP"
              4⤵
                PID:3476
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wki9gpxq.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:740
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF0A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2CAE9B16A00E434F89CA82FA1C4797A1.TMP"
                4⤵
                  PID:4832
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\i_6wsoqj.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:4456
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF67.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9EF9AE0D3E154251A5E58B3E8A2E8B69.TMP"
                  4⤵
                    PID:4480
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-9xye_zn.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2684
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFE4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6D2018AA3C7D42FAB2B43F8FF8B761C.TMP"
                    4⤵
                      PID:4232
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\h_9iybey.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3980
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1042.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc53FB77DF48BC47BD8A5D9C41E0D02A9.TMP"
                      4⤵
                        PID:1144
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\e7gohlci.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2680
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES10B0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC3D0862BF17A43E8B5A6D2FA09E773F.TMP"
                        4⤵
                          PID:4760
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yegcnrha.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1928
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES110D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFB79C30594A04E959BD6ABA7DCC416BB.TMP"
                          4⤵
                            PID:5024
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\q15ni4ta.cmdline"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2968
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES116B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB68E10CE671D4F48AEBD545349E7311E.TMP"
                            4⤵
                              PID:2092

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\-9xye_zn.0.vb

                        Filesize

                        271B

                        MD5

                        325f27ef75bebe8b3f80680add1943d3

                        SHA1

                        1c48e211258f8887946afb063e9315b7609b4ee3

                        SHA256

                        034c75813491d628a1a740b45888fc0c301b915456aaa7ba6433b4f1368cda35

                        SHA512

                        e2165b425558872897990953c26e48776f45751a53da035f1ad86ac062ec23a2923b984d84f992de5c0170f6e192feb155ffff25f51bc76ab273b996daacb804

                      • C:\Users\Admin\AppData\Local\Temp\-9xye_zn.cmdline

                        Filesize

                        171B

                        MD5

                        fba59cc9b1d1b977373b39ae4d667fcb

                        SHA1

                        f5734349727c66c036ac3b2c8f0e7f77fb9ec150

                        SHA256

                        03239b69f1839f0fe677729a56c33e3c81fe6cdc45ce2a2e893fbbc038eccd23

                        SHA512

                        0829bc00c1bb792207ef6b918a836cb79d917a0c0ee65a2ecf76388953c09a59b4cf81cfb2f2ecb4c32b3302e1bdb212096e4fc296a6b25dcced7c81e95e8ae1

                      • C:\Users\Admin\AppData\Local\Temp\RES1042.tmp

                        Filesize

                        1KB

                        MD5

                        ab0fed0d2744dee8519af47183a88d82

                        SHA1

                        70676d28b37ba5a6d08121cd3719ca059f696a6b

                        SHA256

                        93ce83fe7497ed43c90d6d6a77733531a388a6109dd77606da7815945ecec9e6

                        SHA512

                        30a4709c844bb2f2d99f86b56fe0780ed1c78708665e6204e709e5c2b8a3cad7ef34651a68e5d9873eb3f2aaa8e7783f36e17156b380ecb9c9fac6457e61cd9f

                      • C:\Users\Admin\AppData\Local\Temp\RES10B0.tmp

                        Filesize

                        1KB

                        MD5

                        8b52771e4bbf324af06690979b16dbf3

                        SHA1

                        0040072139184cf60ebb5d60b5fd0fac084464f3

                        SHA256

                        c0bca1cd650c335b6cd12f51db0b5ecf70aaabea838ed7e6ebaa843091862685

                        SHA512

                        56804feae109b3e7b4e30cf4e03370a4a9bc485f65605b02db8d6a447958c40445ede85b92808623a2eff4b43702fe919b29c7e24dacdb7064282b79a22467b3

                      • C:\Users\Admin\AppData\Local\Temp\RES110D.tmp

                        Filesize

                        1KB

                        MD5

                        1376a6cd536220d293d8d440295f72ae

                        SHA1

                        092a58278ef0fe25f281bd95c10020e28439aefa

                        SHA256

                        f6ca9d7287faa837b2a9964acc5e160701ad48b64c33f4fc23b46f92f9e7d0f5

                        SHA512

                        73952631e4b182c8df3b88e585a7a125d8a8b715bec56dc1bee9fbfdcf38b759d0a030c2ba088b7bd17019ed3a0cfc2b0e4804e31346ee7de0b6450160baae9a

                      • C:\Users\Admin\AppData\Local\Temp\RES116B.tmp

                        Filesize

                        1KB

                        MD5

                        f41eceb640d1e27b39ee987856a09cd2

                        SHA1

                        e7bd2c2d47b70aab330fce4afd92b74677c2cc4a

                        SHA256

                        11f3de7804f540600395475bb5068fa0e5f186d1473635e744efe10377c0d2fa

                        SHA512

                        84e696c65a0de592b3f320d5f272bfd1fe14687c02e679c7601e8e7df02e65657d5dd944d77c311af5a764d2146cc814876267acc02c71580e3a0d376398f98b

                      • C:\Users\Admin\AppData\Local\Temp\RESC89.tmp

                        Filesize

                        1KB

                        MD5

                        5695a068057c3bc9d3d3963343e6fff8

                        SHA1

                        0ac718bbe87e52a821235d7ec332b043ebbf93ff

                        SHA256

                        f618fc7c0f97f5fa1074b63d77f8884a941c6394aa8100735023eb73335c2474

                        SHA512

                        b9f192f1fb7c91a021c50596b4644da4e08750ee1017bdd64f46afde417506db24e89aa9715e704ae53a4e9c2d96185c8fe4ad7d50fbdf32dd441c64c1540a2b

                      • C:\Users\Admin\AppData\Local\Temp\RESD83.tmp

                        Filesize

                        1KB

                        MD5

                        42e0daf531a3463ae0ee10623ef22a3c

                        SHA1

                        e5f3f5d8700e3979ae939dfcc5fca27fe8624cab

                        SHA256

                        eed92cf549d2adbac50fffcba69845c6b7d1d8173162378a7f9f5b9af7a2d92f

                        SHA512

                        9555de491eead14447c3265b7a51a104d22778e7baa0588769106fad78374879109ad70bba7763f5d0dbc43430ede9d845a2f9fe6acc5632a2b0afb507b489da

                      • C:\Users\Admin\AppData\Local\Temp\RESE6D.tmp

                        Filesize

                        1KB

                        MD5

                        3a2281ed91259617677153b87bbf69df

                        SHA1

                        bf0ec3dae941241266e605734274cd9cda1aac93

                        SHA256

                        ff78d09c090160e73f29d8a46c80fcc0ff0f85dfdf71f160970a2d845f6b36ed

                        SHA512

                        9803359932888527d1dbbd9c71efd18c7ad163090a344a4b31b620004c00dfea1a2a98ec5d78ae7f0fd49631d49513286f48d9d1b577830c3853e967f9f0e75b

                      • C:\Users\Admin\AppData\Local\Temp\RESF0A.tmp

                        Filesize

                        1KB

                        MD5

                        8cf578ccd8c538223ba22fb507ad3ddc

                        SHA1

                        47771aa7b7c0891a6c862a5b52573da9856a6cdb

                        SHA256

                        204b04f6b28429bf184e7f35f16afcbf708d8b790527d1f85ab071326e1b580d

                        SHA512

                        30ca4ea87c1c8b83e30162baf23be0e7ef05f402a43d23cee6d35058b5b65ce692625ea89e0864d47c0af043f4bb1f8754797ccdf0a734689dcee01d50a767ca

                      • C:\Users\Admin\AppData\Local\Temp\RESF67.tmp

                        Filesize

                        1KB

                        MD5

                        bf6f058ec813a13960e08a700b0380e1

                        SHA1

                        42be09402622c6d9b368c480152d43436868ab91

                        SHA256

                        79c93478f59db7db39d81f0c9b1fa65154949ca0120f88737c9533bf952a974f

                        SHA512

                        1a36c88e33fbe128b282e14e98b8f18dc429098c72d83994833f98f87dc03b17312937b0e3fa8f8fcd41e4e0eae15249a1ce8d5f2d640c46cfdbdd6801d9da2a

                      • C:\Users\Admin\AppData\Local\Temp\RESFE4.tmp

                        Filesize

                        1KB

                        MD5

                        001ae11dd0f71fb27901634b14798022

                        SHA1

                        f8e65938447ba48f972b81dcd1cfb1d0a09450b1

                        SHA256

                        be664f8ed33be284680afa702f983dbe4af7af87b76e372c87162534d8a881f5

                        SHA512

                        32c7da822cafb0df1e7b461255e9e3fe39cfd2f8bf68bf1e2698a30676677f5b7be50040fed2935bf2f985eef298dc3eccf55f0e416b9b543f02d45dd07b170a

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rp05blgk.5aw.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • C:\Users\Admin\AppData\Local\Temp\dsctjgp4.0.vb

                        Filesize

                        262B

                        MD5

                        88cc385da858aaa7057b54eaeb0df718

                        SHA1

                        b108224d4686b5ca3faaeb1c728dfba8740a6eca

                        SHA256

                        08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                        SHA512

                        4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                      • C:\Users\Admin\AppData\Local\Temp\dsctjgp4.cmdline

                        Filesize

                        162B

                        MD5

                        031a9f916c8aff88a6f314991088855f

                        SHA1

                        20c76102184f52bb912ec8f35706d3c83016cf82

                        SHA256

                        b95cacbf521e31381b4f02354683d9d7e225eda700af9caa55f7c903d715eb63

                        SHA512

                        a6745fd8872418ac9821db538c23dfcf3ca6399bf9310e522578ea84817848e1b69e49925b448c3133254cb50633d2cce09a4b5840fb5a08cd2554be8a889e81

                      • C:\Users\Admin\AppData\Local\Temp\e7gohlci.0.vb

                        Filesize

                        264B

                        MD5

                        5ce3977a153152978fa71f8aa96909e9

                        SHA1

                        52af143c553c92afc257f0e0d556908eaa8919cb

                        SHA256

                        e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                        SHA512

                        eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                      • C:\Users\Admin\AppData\Local\Temp\e7gohlci.cmdline

                        Filesize

                        164B

                        MD5

                        1dae7ba69804c3408f549ef8cf2db75a

                        SHA1

                        330b98c3980ef7345b99149f532c6176c552d923

                        SHA256

                        a23e0239301f4059cdbfd52104769346e7b2f958010554747c560600c08c9de3

                        SHA512

                        4fc2ed5099521184c0f68e6deedcbb91f14688d7c88b3f9127f3a06816936ccf0421a2d62fbe6e43a62426c42eb5d2dcf6181c280e7d1fcc00b49122eb334517

                      • C:\Users\Admin\AppData\Local\Temp\h_9iybey.0.vb

                        Filesize

                        274B

                        MD5

                        539683c4ca4ee4dc46b412c5651f20f5

                        SHA1

                        564f25837ce382f1534b088cf2ca1b8c4b078aed

                        SHA256

                        ec2210924d5c1af6377ef4bdf76d6ca773aaa1ae0438b0850f44d8c4e16ef92e

                        SHA512

                        df7c1a55e53f9b9bf23d27762d2d1163c78808e9b4d95e98c84c55ca4ecb7009ed58574ae6ddede31459f300483a1dc42987295a04f6c8702f297d3f1942f4ac

                      • C:\Users\Admin\AppData\Local\Temp\h_9iybey.cmdline

                        Filesize

                        174B

                        MD5

                        fe04e8d6d55d14ca44f6c75893ece6ae

                        SHA1

                        c47042f08ee59985d261c4ef978a776f51444518

                        SHA256

                        0154b8b4fa8219eed20d2ffee7d9a8e7fccb5592a892fe4c102db0c1bd5957f2

                        SHA512

                        8dfe41788d9435aad8fa08edd7d6269a791050d5c409ad561ac32e853f6f8db322299f4aa5a501122adf2d989f1f9fb203a9c216584207f2327ef8c1df1a29a1

                      • C:\Users\Admin\AppData\Local\Temp\i_6wsoqj.0.vb

                        Filesize

                        272B

                        MD5

                        2b3aac520562a93ebef6a5905d4765c9

                        SHA1

                        10ab45c5d73934b16fac5e30bf22f17d3e0810c8

                        SHA256

                        b9f0edf067faaaa7da2d47e3d22b957cd302eb25e01e08ea79c664868f328f89

                        SHA512

                        9514934ed12d93ea3ad4e6873cf294bafa114bc7a784a93b14dd2410d07fae3a2c00308035a5c129c57e283de8b94ed36fd9f9de35b08eb79a82a0c732e50446

                      • C:\Users\Admin\AppData\Local\Temp\i_6wsoqj.cmdline

                        Filesize

                        172B

                        MD5

                        d1d1f7e81b59114a530b1042aa465fd0

                        SHA1

                        069ed750f8e1c5c9bb1da3479dbd6c1454cacdad

                        SHA256

                        1f59424b9b3db24c3b92d81f3279ba59dd5ba397aae6f072f97e24279a3bb560

                        SHA512

                        8d533b693ea17acb9b3eea7a65b8e3925b2ff06d0e3a74c382fd1dabe9b6e8ad30c055607760c4c1cfc272c833b2f3b3c31d252c829d0b8882937fa859b3902f

                      • C:\Users\Admin\AppData\Local\Temp\iriesckv.0.vb

                        Filesize

                        256B

                        MD5

                        076803692ac8c38d8ee02672a9d49778

                        SHA1

                        45d2287f33f3358661c3d6a884d2a526fc6a0a46

                        SHA256

                        5b3ab23bcadaeb54a41bdb1636bcaf7772af028d375f42baeb967de6579ef2a3

                        SHA512

                        cc9126384a287ccb99d10d5c2d3034cdbc8a45e94f1cec48dd95f2aa08ebbe3053ffd6d6effa31f2d84164edbb6136398cd02c08b05f027a6a777dffd1daea5d

                      • C:\Users\Admin\AppData\Local\Temp\iriesckv.cmdline

                        Filesize

                        156B

                        MD5

                        e44d7744d70fef724a4150b60ae3d561

                        SHA1

                        cc6a4482a675f9613a79adb8d0c41e3ae52d7dee

                        SHA256

                        88ff0e4bfd82420c5938f2e4068aedb4e491ddadfb721018a4a674e5abab507b

                        SHA512

                        c101a02b104f65d2946e37560baf60a6cc719ac8ee3376ea5642e9d0cf85818ecf8a4bf219c2aa952bf6cf63e081e04500cc13b6c81de55c8559f81fa8b0be90

                      • C:\Users\Admin\AppData\Local\Temp\q15ni4ta.0.vb

                        Filesize

                        273B

                        MD5

                        3c3d3136aa9f1b87290839a1d26ad07a

                        SHA1

                        005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                        SHA256

                        5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                        SHA512

                        fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                      • C:\Users\Admin\AppData\Local\Temp\q15ni4ta.cmdline

                        Filesize

                        173B

                        MD5

                        4751f99990928618b8f112fd8d0d1397

                        SHA1

                        29166d8a741a9bfb3aa179f3f14e697b687436e8

                        SHA256

                        38cb4839a326f16729e60710acf96d75c32faf4e954924f8a32b1f60f8e2f467

                        SHA512

                        e59dc21e06ff648221a510ca46e2aa5822452dd0ff3bffc7b416349e1c57e5c9e71fbd868d92ac297d18482be8bba4eb70e41ce904aa57ec1fa3defa9f8b88a5

                      • C:\Users\Admin\AppData\Local\Temp\ucadub2y.0.vb

                        Filesize

                        263B

                        MD5

                        d1110a95f1e40f726584bd99eca52fe7

                        SHA1

                        97fac683e1116ab31a9cc9c3dcfd9fe9e53505c3

                        SHA256

                        00f373eb310beace70146b6e0fd188aa2f437efb2e5a2714a11d4d58e27d3142

                        SHA512

                        f15b5b310ace82a0106b551d71ad3d48e1c75085aa78b8bb3374a2334ceb073bd4d1bf4cd0b4e39034c39f01b6bcd76e8be30198e4872f5641a7d29b255154b4

                      • C:\Users\Admin\AppData\Local\Temp\ucadub2y.cmdline

                        Filesize

                        163B

                        MD5

                        5a71af09c7ce4d842a795da9102d5046

                        SHA1

                        47349f57d91f64595bedfca0fc9570bded8b130d

                        SHA256

                        017749ab02365d52745835c77af38da686f3ea204c58f0859017424225960d0a

                        SHA512

                        5f607ef826bed90aaec00e274700a8ca68c03731f3c4fd121d875090f93d717ec18cc600b4aae6264c7250d5d5026d1e7a1eeed203d7872c6b94b56066a99213

                      • C:\Users\Admin\AppData\Local\Temp\vbc393F3E0D1568479B82F02F516970D1D0.TMP

                        Filesize

                        668B

                        MD5

                        3906bddee0286f09007add3cffcaa5d5

                        SHA1

                        0e7ec4da19db060ab3c90b19070d39699561aae2

                        SHA256

                        0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                        SHA512

                        0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                      • C:\Users\Admin\AppData\Local\Temp\vbc53FB77DF48BC47BD8A5D9C41E0D02A9.TMP

                        Filesize

                        684B

                        MD5

                        8135713eeb0cf1521c80ad8f3e7aad22

                        SHA1

                        1628969dc6256816b2ab9b1c0163fcff0971c154

                        SHA256

                        e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a

                        SHA512

                        a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4

                      • C:\Users\Admin\AppData\Local\Temp\vbcAA957D6DAFD94D8790E4893C34CF8055.TMP

                        Filesize

                        644B

                        MD5

                        dac60af34e6b37e2ce48ac2551aee4e7

                        SHA1

                        968c21d77c1f80b3e962d928c35893dbc8f12c09

                        SHA256

                        2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                        SHA512

                        1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                      • C:\Users\Admin\AppData\Local\Temp\vbcB68E10CE671D4F48AEBD545349E7311E.TMP

                        Filesize

                        684B

                        MD5

                        7a707b422baa7ca0bc8883cbe68961e7

                        SHA1

                        addf3158670a318c3e8e6fdd6d560244b9e8860e

                        SHA256

                        453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                        SHA512

                        81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                      • C:\Users\Admin\AppData\Local\Temp\vbcD01C2A76D59F42E5BCE4FA30B318FCDD.TMP

                        Filesize

                        676B

                        MD5

                        85c61c03055878407f9433e0cc278eb7

                        SHA1

                        15a60f1519aefb81cb63c5993400dd7d31b1202f

                        SHA256

                        f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b

                        SHA512

                        7099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756

                      • C:\Users\Admin\AppData\Local\Temp\wki9gpxq.0.vb

                        Filesize

                        271B

                        MD5

                        ac972015bef75b540eb33503d6e28cc2

                        SHA1

                        5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                        SHA256

                        fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                        SHA512

                        36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                      • C:\Users\Admin\AppData\Local\Temp\wki9gpxq.cmdline

                        Filesize

                        171B

                        MD5

                        9c14170040e1582ed99314b143a9b1a7

                        SHA1

                        0f35fcb639a5bdeacafb69be22846e0c4c98f358

                        SHA256

                        1939577b2135570f3c3a6bf5881a1ef8c2cc24c9411db5d9b7a81b803408afb9

                        SHA512

                        67430ee9fed4a64deaa092923aef287b89241c79c80f8faded14c0d49d8cb2088e2ce5d4e41a02c9ac62925445d767ed4f6a6399b80fec1fc2cf15c32e82ac2b

                      • C:\Users\Admin\AppData\Local\Temp\yegcnrha.0.vb

                        Filesize

                        270B

                        MD5

                        658573fde2bebc77c740da7ddaa4634b

                        SHA1

                        073da76c50b4033fcfdfb37ba6176afd77b0ea55

                        SHA256

                        c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                        SHA512

                        f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                      • C:\Users\Admin\AppData\Local\Temp\yegcnrha.cmdline

                        Filesize

                        170B

                        MD5

                        8ae90448c3b5301e4bebaaa40fcff711

                        SHA1

                        ef12779844047c5dee41c86f8773c3b58772c8fa

                        SHA256

                        29b045a3732dc030eba7b23b0b2e20b973d5f8a4fdf191f5bfe167ce0b7117c1

                        SHA512

                        755a3cefff4024f1aa7dfbf05596c52eaf8760f839c0ce292e1218a0669e479b7558b5499e0ecb5ce70cf26c4a50480caa5c20686be3f914f005abeb3f238c69

                      • C:\Windows\System32\MSSCS.exe

                        Filesize

                        21KB

                        MD5

                        6fe3fb85216045fdf8186429c27458a7

                        SHA1

                        ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                        SHA256

                        905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                        SHA512

                        d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                      • memory/556-31-0x0000022F25DF0000-0x0000022F25E12000-memory.dmp

                        Filesize

                        136KB

                      • memory/880-21-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/880-3-0x000000001C910000-0x000000001C9B6000-memory.dmp

                        Filesize

                        664KB

                      • memory/880-1-0x000000001C440000-0x000000001C90E000-memory.dmp

                        Filesize

                        4.8MB

                      • memory/880-7-0x00007FFEF72D5000-0x00007FFEF72D6000-memory.dmp

                        Filesize

                        4KB

                      • memory/880-8-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/880-6-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/880-5-0x000000001D260000-0x000000001D2FC000-memory.dmp

                        Filesize

                        624KB

                      • memory/880-0-0x00007FFEF72D5000-0x00007FFEF72D6000-memory.dmp

                        Filesize

                        4KB

                      • memory/880-2-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/880-4-0x000000001CA30000-0x000000001CA92000-memory.dmp

                        Filesize

                        392KB

                      • memory/4956-19-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4956-17-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4956-22-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/4956-18-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

                        Filesize

                        9.6MB