Resubmissions

11-02-2025 00:12

250211-ahcqdasrbz 10

08-02-2025 06:10

250208-gw53ea1mhp 10

01-02-2025 10:25

250201-mf4saszmgl 10

01-02-2025 10:23

250201-metkyaxqdt 10

Analysis

  • max time kernel
    150s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    11-02-2025 00:12

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2752
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2396
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\w90-ganh.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA2D5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA2D4.tmp"
          4⤵
            PID:2968
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\q5uhr1sa.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2016
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA390.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA38F.tmp"
            4⤵
              PID:2896
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\3_kotbkd.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1616
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA46B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA46A.tmp"
              4⤵
                PID:2228
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1zy-z5za.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2260
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA4F7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA4F6.tmp"
                4⤵
                  PID:2192
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jgcz8oxl.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2052
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA5C2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA5C1.tmp"
                  4⤵
                    PID:1552
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\l-vdau-f.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1848
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA69C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA68C.tmp"
                    4⤵
                      PID:1832
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ljos-g8w.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1056
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA7F4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA7F3.tmp"
                      4⤵
                        PID:1556
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\91hu9szd.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2688
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA97A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA979.tmp"
                        4⤵
                          PID:1992
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\s1ktuyiy.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1964
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAA54.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAA53.tmp"
                          4⤵
                            PID:2060
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\litnoq7n.cmdline"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2680
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAAF0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAADF.tmp"
                            4⤵
                              PID:1112

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\1zy-z5za.0.vb

                        Filesize

                        269B

                        MD5

                        d8ec3923c7b4bf7ae4ba2dd32ba5174f

                        SHA1

                        bd232f852b5428b0360c9708604793deb513c36e

                        SHA256

                        316f5f33d99324745cbdad4dfe3ece93321e270a177f3646d78d72d1f7a1d648

                        SHA512

                        062694e7951b534e5c93d4d2e65c65cc59b9be7f3f1e469b1679d61e03f1770246222009461c6e2a8ddfe41fa367ed6ebd83f53e0a1c3f24db5e97932558ce11

                      • C:\Users\Admin\AppData\Local\Temp\1zy-z5za.cmdline

                        Filesize

                        169B

                        MD5

                        4088b8708d3286626f9c4bb4e4a14812

                        SHA1

                        73aca6dfebb052acba445be6263f3b9f7bc256f5

                        SHA256

                        1b9d12beb6ba51962f7fb6ee2ef5178f35b8c7f0dbc8966fa58ee998ecf80153

                        SHA512

                        078dfc4bb7975005ee4a6ac2748a9139129db014a8f66b71c460fcb12fa3476bba59401d529bdab307deb09b395869561af8b6cfad7c3035cb5220dbfa8fa1c8

                      • C:\Users\Admin\AppData\Local\Temp\3_kotbkd.0.vb

                        Filesize

                        265B

                        MD5

                        cbdf61e7858f1274d58258756e185765

                        SHA1

                        15f0d177b5924a5176ff82f0b79bfa3db558145c

                        SHA256

                        d0aa53536d1316c420848db8bb089b24f9669f1baf3be092a7e0f0a0bc1b997d

                        SHA512

                        ab21cbb170e38a2600db2587ce92b74499107e361d55bbcd5e6281568307ffb1c087aba905c042e2e8960e2e554c84057a197dc4c03121b682868def94c5a038

                      • C:\Users\Admin\AppData\Local\Temp\3_kotbkd.cmdline

                        Filesize

                        165B

                        MD5

                        a0a6e177947e1a0c2119cc87c2785f5d

                        SHA1

                        7b6a8a33bfd9a09196f30047087d443520f17eaf

                        SHA256

                        23b903396d39f9ea3196b367c62821b39c444550b04b7f780acccfef89de94d5

                        SHA512

                        2e7cb0f0c6198f7dc7574cc57a5efaa8f4ef7e9faac6cfea956b04db0b24cb0995b4af805aa5924d1638694b435efedc99245c1a8947338462342fb61b72b331

                      • C:\Users\Admin\AppData\Local\Temp\91hu9szd.0.vb

                        Filesize

                        264B

                        MD5

                        5ce3977a153152978fa71f8aa96909e9

                        SHA1

                        52af143c553c92afc257f0e0d556908eaa8919cb

                        SHA256

                        e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                        SHA512

                        eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                      • C:\Users\Admin\AppData\Local\Temp\91hu9szd.cmdline

                        Filesize

                        164B

                        MD5

                        4c3164533e097714c925ec2728b40e76

                        SHA1

                        31de6f170191e227d2d2229e386af51c8f98f664

                        SHA256

                        de7d5ec815112e790d6f4a355b427124629957ff416c6de20ffed70a92574ff4

                        SHA512

                        6d881ef1bb4473226a55afd57b93d99b29a74cef7b427622bd1d8734731a3353362b646e103a296dcf71c959060b5270ca255f77031cb2970a0527a0bbcee9f8

                      • C:\Users\Admin\AppData\Local\Temp\RESA2D5.tmp

                        Filesize

                        1KB

                        MD5

                        920373eedcc89ffa903583d7522c6f21

                        SHA1

                        50cf90396a47653c1400258b35718471a636d80a

                        SHA256

                        660ddef1b86f02844a2c785881915283f0b8022a7efbe86ac2d873d04ad661a2

                        SHA512

                        46d62d44db8303d1f607550f11491d1853b646110d024e678c6c7b6de8eb7d7d537f4beb12f1136d572b9fec4f2c873c0f1c902b7e52e1e231bf100fa289fcb1

                      • C:\Users\Admin\AppData\Local\Temp\RESA390.tmp

                        Filesize

                        1KB

                        MD5

                        ce032dfbefc9c11c5b2714237b32560d

                        SHA1

                        13ca9c8941fa4702ab2f7b2d7939cd7b98bd8e46

                        SHA256

                        5806053377f54512e4ca17317a2002bd15d41fb636812ca0a0c5f596a0885914

                        SHA512

                        e5335dc733eccb3cc10c3da7c241201efe26ece9974e58f6b13b3170f708b27d1701fc4d4ee085578163b07f6613459a5bd33dd4b79de53431ffa295ceb903f4

                      • C:\Users\Admin\AppData\Local\Temp\RESA46B.tmp

                        Filesize

                        1KB

                        MD5

                        2049c44f6375f816140faa1ac688e708

                        SHA1

                        2a12fd6ef213548a109ec2528165853a29c0a573

                        SHA256

                        727b50ca6684bc008dee4df624c6e9865bc03ef15dce3ed654ecdc4bebaa7162

                        SHA512

                        b597d9a6db565e3f03a7bdd0294946aa67de5e4a23235d8b41aeed8151eb590a0151fa67a932a4aa2caa236178f6f23e52d6b8ab7b63ae9674c1e23f5e5701d8

                      • C:\Users\Admin\AppData\Local\Temp\RESA4F7.tmp

                        Filesize

                        1KB

                        MD5

                        b17db32c0e965fea124f33a0e0fa0818

                        SHA1

                        c4ee504c09b7a68772a6b0ef3371ed3e02781cda

                        SHA256

                        973f7e17f3202c344495a3efc7dd6299a1f099b03fcd61cf41ac5c15ac063f3b

                        SHA512

                        975dc9014d17286f11d920c9c6d6442979c4a590d890135a67a5ed47269bd62ff8f6fc58a1657d01e577b78c3bc3c7d68149008089cde81252c9749730dac825

                      • C:\Users\Admin\AppData\Local\Temp\RESA5C2.tmp

                        Filesize

                        1KB

                        MD5

                        20424f63ce1a612322d909efeeb74d64

                        SHA1

                        ace074a4ca63cf575bf704afc08ced195dfd173c

                        SHA256

                        c95a968d3d0047b2a356dcbf2b7db18d0b08da8f9b0a19046bc8bcde7db4053e

                        SHA512

                        4f05f141b1250ff83cb6fce2af58d017fb9877d7d0a7eb76799878fc70b70b01fb2fb45e3a1295c28993f368beddd2d659998c1364a0dce63843b51d4e756a8a

                      • C:\Users\Admin\AppData\Local\Temp\RESA69C.tmp

                        Filesize

                        1KB

                        MD5

                        b90bb6728bb3b4cdc8e6a8eab5d1baef

                        SHA1

                        7a0d44cbde8bbf6eb3113fd6a42bbdb4a77b3986

                        SHA256

                        79933f84054c5ca6bfad0dfcb2493f133451aed2ecc343addfe317ed1f0f3a86

                        SHA512

                        f8edd9ef29edbdf92fbd3f2def1d9632f0646f3bdb24527330d5f6c5ffb61ff18a69a40bde873be4957ce9825328a09c95176c34dfa33a1c479adfb7093746d1

                      • C:\Users\Admin\AppData\Local\Temp\RESA7F4.tmp

                        Filesize

                        1KB

                        MD5

                        04f4075a15505a430d36b958daa5ddd8

                        SHA1

                        f4c8c826ff82099441758acbc2f5059a7bd401d5

                        SHA256

                        d61079361e65098968cebfd5bc91ace5955f94e0c498b2b3921db71dcb35371a

                        SHA512

                        034ec0a9fc39b4ab83c943fc906c51a1bcdcb0ae79e24a3cafd8f18d9febca8d6280aafdd936930482dc3a60d26439ff50264df30fd1e2ab3b4877d5ecafef85

                      • C:\Users\Admin\AppData\Local\Temp\RESA97A.tmp

                        Filesize

                        1KB

                        MD5

                        a90e7826b901d460af3cbc63eb0dc758

                        SHA1

                        ff4129408112f3440b2bb36156b320921881d0e9

                        SHA256

                        684a38f9ea8a21e2e4098412170f97cd412ee1fe213bfa4590c4f0a73ce6e122

                        SHA512

                        1e79e9b28d5d1c60dcfcb02d8014c93e44951af5b1861e4cc82c93286674c76e9a1684fffc956b1a935bc5d7a47bd9d479c691123286b167588e68b444bf264e

                      • C:\Users\Admin\AppData\Local\Temp\RESAA54.tmp

                        Filesize

                        1KB

                        MD5

                        8fce2b157edf2d5db723f135a3ddbc9f

                        SHA1

                        bfbb8774694985731cdb675d1ebc62e661f976d7

                        SHA256

                        b34108227a1d4a37820c691b584774d08999ab8ce78bff74e001ecfbc78bb964

                        SHA512

                        6927f6d2521eba5e26870c4284908acdb5703815c29f50530b2960b699b801e40db35d07db803bdd6cb2aa630a31143bfbe5b0588a04d19839f2ea3050651b1f

                      • C:\Users\Admin\AppData\Local\Temp\RESAAF0.tmp

                        Filesize

                        1KB

                        MD5

                        122e4518146b6740423dd9b156b8f125

                        SHA1

                        3e103edc4089ae3a1955993fffc1361b80058f17

                        SHA256

                        2b11c6f2229c5de6f96cb6cb635feb0d5429c03b391fdcb065fda969075f483c

                        SHA512

                        f961aa10fcdb7df84bc7c48ec51173baa5e363a1bfd7edf34e4596700c8d77bceeb1c8ed847dba90ed3ae76dae4067dbfe458c1fd2eac4204e789e54e20cab3a

                      • C:\Users\Admin\AppData\Local\Temp\jgcz8oxl.0.vb

                        Filesize

                        271B

                        MD5

                        ac972015bef75b540eb33503d6e28cc2

                        SHA1

                        5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                        SHA256

                        fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                        SHA512

                        36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                      • C:\Users\Admin\AppData\Local\Temp\jgcz8oxl.cmdline

                        Filesize

                        171B

                        MD5

                        a01ff53d8305406e59651b65a769ea33

                        SHA1

                        44afff723ba8465d2a937307b073d59b0431d778

                        SHA256

                        32e281687eb13abed934db887a611bd54e0a34266ab6e016db47a5a3d975e456

                        SHA512

                        6a0b064f3044c8ba89e14366d6db9075d31652885bc0cabb53f343090a68815c2744dcaf9187271b576e82dd7ceef2881fabf9fa053f5d026d21b01c20d7773d

                      • C:\Users\Admin\AppData\Local\Temp\l-vdau-f.0.vb

                        Filesize

                        290B

                        MD5

                        ce1182df38f7b4c7a89d1e4d1886b0d8

                        SHA1

                        ba5cdc6e13b761912d14ec042639566eebc23eca

                        SHA256

                        e87616f590de6878e0a1051e52bb968d39bad4c7b086cdaecc064c6aa9582e3a

                        SHA512

                        7be8358cbcefde4b1e1a28480eaea0daf5bbbd25aba3d1bd8c589bad3adb63a90551830efabc6e0d2b01a406e41e44c5797502abc88566694fbff7c2091e05a0

                      • C:\Users\Admin\AppData\Local\Temp\l-vdau-f.cmdline

                        Filesize

                        190B

                        MD5

                        bb7c45f56922b2b33ea2295137e47377

                        SHA1

                        d2f391719099e54e9c224c41d915e14dfeeaf793

                        SHA256

                        0439de98df104212602a4f0a3ac0e3eaca0bcb3977d3739add910cbc54eef2c7

                        SHA512

                        5f449c0d19b76328db37d92d11ba860c502fe04045ad5a1960970c120f7ea91c9b60cdc09a2b2fa5b691d980ccf21e6a2267cb90f5182914201a284b11c8b1a4

                      • C:\Users\Admin\AppData\Local\Temp\litnoq7n.0.vb

                        Filesize

                        273B

                        MD5

                        3c3d3136aa9f1b87290839a1d26ad07a

                        SHA1

                        005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                        SHA256

                        5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                        SHA512

                        fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                      • C:\Users\Admin\AppData\Local\Temp\litnoq7n.cmdline

                        Filesize

                        173B

                        MD5

                        f912e4f20ced5e4172769d2dd4b27f73

                        SHA1

                        7b51158ef8a16a54f4eb2afbea0a5895847402f5

                        SHA256

                        1fb365c5afcb1675675085014d6f7d3bee39a3cd99c46e564f34cd326b68241b

                        SHA512

                        de67fbafd363450a47db330913292654eb57a581a7da7c3b3bbbd6ee5fb40a5ada323caa0764edfe0253ea4a27de773764e167738bff32a2e0ad5deafa2de7e1

                      • C:\Users\Admin\AppData\Local\Temp\ljos-g8w.0.vb

                        Filesize

                        271B

                        MD5

                        b19384e98248a2c238e2360d2fecf049

                        SHA1

                        25f5ab6303d0a81f4ef3cc44c0bb53dd3e564fad

                        SHA256

                        296feb4019e37af5174b813d3ac19fa1b17c4db9ad91b06eba610939983e3262

                        SHA512

                        e9e4dd4a302d643fd1d0dd46d058ca7a45c8e6d8b299c129e1a412d1d3309cfe4d4da6f9d893460dde7e96c40414d65e02dbab9c1411dd945581e749ae8438e4

                      • C:\Users\Admin\AppData\Local\Temp\ljos-g8w.cmdline

                        Filesize

                        171B

                        MD5

                        4d5589039974bae0ca5027346cbbc573

                        SHA1

                        f07d9ac9254f30650cd7bd2d410b760c556b2b2f

                        SHA256

                        658be0c390a2d7b2904ce2ad2f9732aa0eca383446f758eb0fb75e89ab358dac

                        SHA512

                        4863c751ff52cd8adbaf863c4b2e1615b4a8de75701153614285510f1fbb2fd7a9d43f4b2dd824119dcba25abe303c0214a8355e7c46a41d3b24e2756ae46877

                      • C:\Users\Admin\AppData\Local\Temp\q5uhr1sa.0.vb

                        Filesize

                        266B

                        MD5

                        debab8fb1bbcbf74ca2ac313d4d5aa7d

                        SHA1

                        2a4058378b3df8ef9aa547d1511a425ef043d848

                        SHA256

                        0f1d45b4fd6c36693c7d96bda036a41dccffa4313b92940df6ad180982607744

                        SHA512

                        8beaad01c2f7541532842aca72324eeee7c582d50db2454bab3288dcb2922fdc1f2a0a3e2347a74e744e92c9f8304916c0f52a18754d2e3a5eb2fe6f9fbf6567

                      • C:\Users\Admin\AppData\Local\Temp\q5uhr1sa.cmdline

                        Filesize

                        166B

                        MD5

                        01e08c0a16470ba32b9b9922bbfdc0d7

                        SHA1

                        d96396659bae8200e72b5a3cd51d598709825ed7

                        SHA256

                        17d4af0b7694b7850d473898c87478b71b77bbb6ee52fd4d9848c34c8a23c3dd

                        SHA512

                        47f36d5fdb08dfcd5780d1643103f298c28fdaff554373c989b40164916341c4ab0b91640680314693016d9074bf086c416ebd1cc611a17508cf18508c11ebb5

                      • C:\Users\Admin\AppData\Local\Temp\s1ktuyiy.0.vb

                        Filesize

                        270B

                        MD5

                        658573fde2bebc77c740da7ddaa4634b

                        SHA1

                        073da76c50b4033fcfdfb37ba6176afd77b0ea55

                        SHA256

                        c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                        SHA512

                        f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                      • C:\Users\Admin\AppData\Local\Temp\s1ktuyiy.cmdline

                        Filesize

                        170B

                        MD5

                        80461939ea1dd9b2a151f0bc66685ff6

                        SHA1

                        2ebbe8588b9f5b6e81a3706845e194f6eba1526a

                        SHA256

                        289aab63e2597b76df7c26c112a43d26806522a09440a56c27d586c3550e754c

                        SHA512

                        e646a92bcb3a79538cd3241e312e8f1cc6953202f2fc88a9bbef641cd261575a8460cc7ef364411c42af533c0b25a516b734ec2067ecc6f61cef6256ba88cbcb

                      • C:\Users\Admin\AppData\Local\Temp\vbcA2D4.tmp

                        Filesize

                        668B

                        MD5

                        3906bddee0286f09007add3cffcaa5d5

                        SHA1

                        0e7ec4da19db060ab3c90b19070d39699561aae2

                        SHA256

                        0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                        SHA512

                        0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                      • C:\Users\Admin\AppData\Local\Temp\vbcA38F.tmp

                        Filesize

                        684B

                        MD5

                        41857ef7e71c255abd4d5d2a9174e1a6

                        SHA1

                        95051d6ae43ff1bd9e5ebc95aa2e7b7c3165cb6c

                        SHA256

                        dfcdf12316f3b523895ec611d8e8d9fdc189ab8dde4e86fb962541aeac54e302

                        SHA512

                        ec6c5a7729d273be3ff194ffe47056731ab4100e298b7f50108a2599be59c84bd1953a90c4d7390c477257986a18d336d951f590b782f1aa983de7bd4c86e6ac

                      • C:\Users\Admin\AppData\Local\Temp\vbcA46A.tmp

                        Filesize

                        684B

                        MD5

                        453916f7e3952d736a473b0e2eea5430

                        SHA1

                        b79ccb2b555a81b8db470ec9fcaea26d42ef1c8b

                        SHA256

                        b0f8b94a35a12060c70e9f81641be22cbf1f1794c73260f48a2e6e46608623fe

                        SHA512

                        86d32a03cf04ef8640075c82e5fecb23034413a41b80b81c900a423b03f44589f774f68f83561465e7c9ce46512c818eef5a90e5ed9f7b3f86b592be34fa367f

                      • C:\Users\Admin\AppData\Local\Temp\vbcA4F6.tmp

                        Filesize

                        700B

                        MD5

                        6ed26221ebae0c285cdced27b4e4dbac

                        SHA1

                        452e9440a9c5b47a4f54aefdde36c08592e17a38

                        SHA256

                        aacdfb10fa949c74577bb1778fe2f3bab88b3e587c07cfffb003e059097e9e6c

                        SHA512

                        c604368a7b4adfbec5b6898c8880ea684bd085d967c1ebd087c9bed065fe3e2575c8298a9ccaa454d68496386667db998e2a04248dda2ab35905c8a9b1135cce

                      • C:\Users\Admin\AppData\Local\Temp\vbcA68C.tmp

                        Filesize

                        748B

                        MD5

                        b548259248343e12d417d6c938cf8968

                        SHA1

                        19703c388a51a7ff81a3deb6a665212be2e6589a

                        SHA256

                        ab2ce0a14c78f836d2b134a37183b6d89a78b964ea5607940fa5d940d32a0366

                        SHA512

                        73a3902f000a042a448446f6851d6ad61a30bfdfed7d7903b5dad0f368ee43cd6da3b8ba817ac95be1a7427902aba0642af8ccddc4d442867465f1f1f5bf6f81

                      • C:\Users\Admin\AppData\Local\Temp\vbcA7F3.tmp

                        Filesize

                        676B

                        MD5

                        ba2c43095c1c82b8024e968d16bee036

                        SHA1

                        41ea006dbc9f0f6e80941d7547a980a1dde868e0

                        SHA256

                        1209067183104b41f03a5be0f377dc1865155cc84bdb509b871b7ce3366aae72

                        SHA512

                        00dc93cdb8c4cb0a681f99d24c59216a721bce963d76bad972e29cf92aafd74e4af46632c00f5aef4ce3160927db9df8aa9a8926ea4a5cb6974b499785569e61

                      • C:\Users\Admin\AppData\Local\Temp\vbcA979.tmp

                        Filesize

                        644B

                        MD5

                        dac60af34e6b37e2ce48ac2551aee4e7

                        SHA1

                        968c21d77c1f80b3e962d928c35893dbc8f12c09

                        SHA256

                        2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                        SHA512

                        1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                      • C:\Users\Admin\AppData\Local\Temp\vbcAADF.tmp

                        Filesize

                        684B

                        MD5

                        7a707b422baa7ca0bc8883cbe68961e7

                        SHA1

                        addf3158670a318c3e8e6fdd6d560244b9e8860e

                        SHA256

                        453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                        SHA512

                        81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                      • C:\Users\Admin\AppData\Local\Temp\w90-ganh.0.vb

                        Filesize

                        262B

                        MD5

                        88cc385da858aaa7057b54eaeb0df718

                        SHA1

                        b108224d4686b5ca3faaeb1c728dfba8740a6eca

                        SHA256

                        08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                        SHA512

                        4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                      • C:\Users\Admin\AppData\Local\Temp\w90-ganh.cmdline

                        Filesize

                        162B

                        MD5

                        6ac1ea3ac5f419a771a2497f5b9f2ffe

                        SHA1

                        76e6bb211ad38ff5de9e57fd4380baa27021c7c1

                        SHA256

                        d28dca270975c2992a5df4ad9307cc9406d95704289a81c76d96d37bee3099cd

                        SHA512

                        51c7524d32199449b9850bc209a9579fd1d38bbfacc30ca02557701ba5f430ce089416aea44236312e4385a86e62ee3edebc5ebec7607e936413e2037e8185df

                      • C:\Windows\System32\MSSCS.exe

                        Filesize

                        21KB

                        MD5

                        6fe3fb85216045fdf8186429c27458a7

                        SHA1

                        ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                        SHA256

                        905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                        SHA512

                        d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                      • memory/2388-14-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2388-2-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2388-4-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2388-3-0x000007FEF610E000-0x000007FEF610F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2388-0-0x000007FEF610E000-0x000007FEF610F000-memory.dmp

                        Filesize

                        4KB

                      • memory/2388-1-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2396-26-0x000000001B0F0000-0x000000001B3D2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2396-27-0x0000000002610000-0x0000000002618000-memory.dmp

                        Filesize

                        32KB

                      • memory/2752-13-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2752-12-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2752-15-0x000007FEF5E50000-0x000007FEF67ED000-memory.dmp

                        Filesize

                        9.6MB