Resubmissions

01/04/2025, 21:24

250401-z8184awycs 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/02/2025, 23:08

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:340
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2216
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ar7-s_uz.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2864
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFC1B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFC1A.tmp"
          4⤵
            PID:1296
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rxaoh_av.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2928
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFCA8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFCA7.tmp"
            4⤵
              PID:348
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\z7okm4vu.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2224
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFCD7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFCD6.tmp"
              4⤵
                PID:2320
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\czkhkl0p.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1792
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFD15.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFD14.tmp"
                4⤵
                  PID:2068
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\_x24yenv.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1236
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFD44.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFD43.tmp"
                  4⤵
                    PID:464
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\me3xcyn1.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1716
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFD82.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFD81.tmp"
                    4⤵
                      PID:1828
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zaf-3cwi.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2016
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFDB1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFDA0.tmp"
                      4⤵
                        PID:908
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oqavsq4p.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:620
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFDE0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFDDF.tmp"
                        4⤵
                          PID:1940
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fcejyrrt.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2316
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFE1E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFE1D.tmp"
                          4⤵
                            PID:1868
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oarieddh.cmdline"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:2296
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESFE6C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFE5C.tmp"
                            4⤵
                              PID:1760

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\RESFC1B.tmp

                        Filesize

                        1KB

                        MD5

                        3a24ddb6c4a7a885c543dd61c364b248

                        SHA1

                        22346223c1a0a71bdf7554ac1c8dd6ef15e3f480

                        SHA256

                        58453f621989ab836a2e979bacb70ed14e656990c6e3649c6aadac7fd4ad38f3

                        SHA512

                        7417cc9402b3fb26a390dbc16cf441cf3d7cfe9e57933f9e45330d9798e005308d009ffec36bef327874180e52afe33a3a35f06563c11e8a65eee6fed8191635

                      • C:\Users\Admin\AppData\Local\Temp\RESFCA8.tmp

                        Filesize

                        1KB

                        MD5

                        5fabfd55fe53450c7fbcf39832645d36

                        SHA1

                        38df4d95ea5307c81204333c932ef973cc2a4897

                        SHA256

                        e7e8eaa49ef71501a24c93027ecd271c75ecc396d2e46370d53f6a196b4722c7

                        SHA512

                        669dde7df85d397209b9885e5920ff4b3593d6c96609f8d39ec6ddfe5136a513eb6795a905917e6bb6c6d8a7356cd9fdf75e50a7d9ed0dfd5189b37bd1798e72

                      • C:\Users\Admin\AppData\Local\Temp\RESFCD7.tmp

                        Filesize

                        1KB

                        MD5

                        3f9b4b57529788663d232561a7257eef

                        SHA1

                        0c36699dc5ddaf59d51c5f38287a708c23208541

                        SHA256

                        09f6e5da71ec343832f24696cfa79babe81b52733c3279f1c88fbd75443b3c96

                        SHA512

                        e0db8df302c977ca0f3ae37ba6977d7ba0dc44f95656d0490bd60ea5b666e17180e19069a1a5d5fe1c7d7056f1241aa0985049a0a197162c05699b1c3a003f0b

                      • C:\Users\Admin\AppData\Local\Temp\RESFD15.tmp

                        Filesize

                        1KB

                        MD5

                        15520730568c96fcb30bb2d28d60f295

                        SHA1

                        83fe8b23858cc16b5260fad999ca4ac0b9fa86ff

                        SHA256

                        2f6e562711dbe6d270cf45e807fdf5d91257d2d2d38a9e27df25a8c2231e4d50

                        SHA512

                        f7dba0191c03b6b6a77f35d9e1f4821529fe8c982928faaccaf6ec213f6b3502586b70d0f55fc0040e4b8fcedfe669211250c0b089d38dd20425176ef51c5837

                      • C:\Users\Admin\AppData\Local\Temp\RESFD44.tmp

                        Filesize

                        1KB

                        MD5

                        fa0815fdb4565ec55c37d1c760004990

                        SHA1

                        f335e8d3bb872740cb38c92dc74f38cf7ecefba4

                        SHA256

                        d35cf7a440036119d1fce76c17055e2510c2888ebcb0ed341ab67bd1f2e7a360

                        SHA512

                        60633e3853c0dac2e77be10c68c7f7eb96878971be7e703ed50da2ca0164afab85aa4354a6f1a5c8e8f96a256f05dde0e8757c1cfd14a544de8799a17240f432

                      • C:\Users\Admin\AppData\Local\Temp\RESFD82.tmp

                        Filesize

                        1KB

                        MD5

                        43012fdd47e345587463c350e73c3c05

                        SHA1

                        e424feb1ddb238a726453090c330cfc6e91b0694

                        SHA256

                        9f1e3e7931022a0184edb1ed300f73842f2ca5beafd3bc63c0f776096ba2f34b

                        SHA512

                        b4f55bf25e50af4efb2cf2a30e70d892425e0bec4d93e966e75a7484ff1f456401606613cc161f43daccbcd71270215b2df969e8814d8c0f8dd326e9213486b1

                      • C:\Users\Admin\AppData\Local\Temp\RESFDB1.tmp

                        Filesize

                        1KB

                        MD5

                        cc677c43bb05c61c9784683d4b1a36b5

                        SHA1

                        1cb7e0da8347fe6ba5b1e309216b4e6a2a637fd6

                        SHA256

                        483c648ef9bd887a1d4d9958793f57e61e399759b7aa5c79d9c17ecf510f7c56

                        SHA512

                        a2eeed83928843ae894da8cbb3c12763e1dbc12f2f8f957536140f93ad0eca5a580cd649accd75a6a44fcc3c8167b5d4a2c1bc94599faade5ee05f8d35c6dd14

                      • C:\Users\Admin\AppData\Local\Temp\RESFDE0.tmp

                        Filesize

                        1KB

                        MD5

                        60065a5b106992062d31ef4a1bf006fb

                        SHA1

                        bf1038b5adf730d1e422c2cf611f58583bd29328

                        SHA256

                        8965863392a0819484d2614d690712139b436404d45a9a62e1d815f6e913113b

                        SHA512

                        2eea9e1f9509fc9561727e03b5ced3ae7a4ea66b37c2229889e6df91ce07743e62a8c08384d86859c5dae1f62a28e9d4061b72832de804088f19e1feb6eebe34

                      • C:\Users\Admin\AppData\Local\Temp\RESFE1E.tmp

                        Filesize

                        1KB

                        MD5

                        a0188354a4165a55c5354f9281d24713

                        SHA1

                        813d7a0f8e5d240814c66520ada1c08fa55a9061

                        SHA256

                        8989d9a1847b4cd99731647feb7ef72ce9cbea4dfa2ce2220b8fc016071a5d92

                        SHA512

                        e20c623b871505b0d875d5744a28c6c530d955056b874102e9ae9e05da8d3cf82fb40c39ed391c9a7610bac03a60e8c8e991bbf9103f14942493e44aa8ad744e

                      • C:\Users\Admin\AppData\Local\Temp\RESFE6C.tmp

                        Filesize

                        1KB

                        MD5

                        132c5896ef6b54320d3d513c06e40aa6

                        SHA1

                        a39f7cb5503bb84541dd91c17624fe4a0435f4de

                        SHA256

                        fbf1410e6b9e2e391d85e6ef1489319988f9baa95fe04176ee941ea6b4d75cdf

                        SHA512

                        ca6d5ab7ee7019389db5b6e7097227ff5244c86a55603fc229cd6d36df3f486a706589716e8f51ac24212ce8bc1bd26fa0fd04547b02fd81d218d2fd65d3a29e

                      • C:\Users\Admin\AppData\Local\Temp\_x24yenv.0.vb

                        Filesize

                        271B

                        MD5

                        ac972015bef75b540eb33503d6e28cc2

                        SHA1

                        5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                        SHA256

                        fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                        SHA512

                        36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                      • C:\Users\Admin\AppData\Local\Temp\_x24yenv.cmdline

                        Filesize

                        171B

                        MD5

                        f92fb3dbf120061f7afcc04d57fcf773

                        SHA1

                        75957fd1fa84d314285edbfd73698cdd71c93c35

                        SHA256

                        56dbb6bf0f20aaecb383a373751f7aa1699f41de15957daecf5e4d0f0aa61190

                        SHA512

                        b8a5539123ec0009a37c9b4045fb47c024a88cd3587cd8e61ca188ea71a39e1a04e6b8782c707f57c3530de8a4dc6f36c68e7540728eba768aa57e9ce9c2ef93

                      • C:\Users\Admin\AppData\Local\Temp\ar7-s_uz.0.vb

                        Filesize

                        262B

                        MD5

                        88cc385da858aaa7057b54eaeb0df718

                        SHA1

                        b108224d4686b5ca3faaeb1c728dfba8740a6eca

                        SHA256

                        08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                        SHA512

                        4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                      • C:\Users\Admin\AppData\Local\Temp\ar7-s_uz.cmdline

                        Filesize

                        162B

                        MD5

                        8a10971a92d56d41a766959e4e006849

                        SHA1

                        25ecca3aa461b1710b84666cd31af190dbe9a3d2

                        SHA256

                        43fd96ff7c1beabd3fe17e2820c9def4c4e3d524e361b5a4d43d558ebb9771cf

                        SHA512

                        264f0299d1a57af3364b494b77342820ecb6757d01d783e6ac53b66e31bfb3848738e1e096cfb3455c69555e7ab0dc8e5aa38225c1f8ff9066cee0ecce9f4d16

                      • C:\Users\Admin\AppData\Local\Temp\czkhkl0p.0.vb

                        Filesize

                        269B

                        MD5

                        d8ec3923c7b4bf7ae4ba2dd32ba5174f

                        SHA1

                        bd232f852b5428b0360c9708604793deb513c36e

                        SHA256

                        316f5f33d99324745cbdad4dfe3ece93321e270a177f3646d78d72d1f7a1d648

                        SHA512

                        062694e7951b534e5c93d4d2e65c65cc59b9be7f3f1e469b1679d61e03f1770246222009461c6e2a8ddfe41fa367ed6ebd83f53e0a1c3f24db5e97932558ce11

                      • C:\Users\Admin\AppData\Local\Temp\czkhkl0p.cmdline

                        Filesize

                        169B

                        MD5

                        e5aca57e53ae1d3d09e005a5a433250e

                        SHA1

                        fd84f7720f64dc072ee6a5702376dbd7765ffa54

                        SHA256

                        7225934b633d532ea94c82aec49642d476bc95a794c0c24016047d9d4e68f088

                        SHA512

                        6641ccc61d28c03c2f5d2e0b161d3a864e7c4a91e389fd2da1d08242a2ed2b7575a8754d4321831e0d3e2fc41147449b21c63aae03421163fdc58259b450c2e0

                      • C:\Users\Admin\AppData\Local\Temp\fcejyrrt.0.vb

                        Filesize

                        270B

                        MD5

                        658573fde2bebc77c740da7ddaa4634b

                        SHA1

                        073da76c50b4033fcfdfb37ba6176afd77b0ea55

                        SHA256

                        c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                        SHA512

                        f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                      • C:\Users\Admin\AppData\Local\Temp\fcejyrrt.cmdline

                        Filesize

                        170B

                        MD5

                        3e8dea0e3dddf2a7ac727345ec680806

                        SHA1

                        d6c8d3cb7939b45b1b489cec0afa162de0cbbf06

                        SHA256

                        f85ee2c1cd1d7a1b03bec371da4d1f019926c457a293643130b66779edcfce7d

                        SHA512

                        02e83bc845eb33d195ce53d57d56069ea2810c691eb2ba6fe64673ccbb4ca316b0e87e68a6e28c54b557e335f03fe2a47707484b6951078c361c0280458d0b79

                      • C:\Users\Admin\AppData\Local\Temp\me3xcyn1.0.vb

                        Filesize

                        290B

                        MD5

                        ce1182df38f7b4c7a89d1e4d1886b0d8

                        SHA1

                        ba5cdc6e13b761912d14ec042639566eebc23eca

                        SHA256

                        e87616f590de6878e0a1051e52bb968d39bad4c7b086cdaecc064c6aa9582e3a

                        SHA512

                        7be8358cbcefde4b1e1a28480eaea0daf5bbbd25aba3d1bd8c589bad3adb63a90551830efabc6e0d2b01a406e41e44c5797502abc88566694fbff7c2091e05a0

                      • C:\Users\Admin\AppData\Local\Temp\me3xcyn1.cmdline

                        Filesize

                        190B

                        MD5

                        ae21948c59930a0c10fdc0fc1dbf66cc

                        SHA1

                        11a8e56df73b6c9585bcc3725b925f18afe16e62

                        SHA256

                        1fa4cec306e0f8426bccaf24904ce7b9c8e5b6620cdecd8a2fff900df3f3a855

                        SHA512

                        caeae7257f18b1a867ea9a5ab1076f4226b90bf69a7d1f873104798b426899e440cd6e95ee64f2e7a5fa67f115a5b03b2c76b09f19fb8b9df4ebdcdad15cbd70

                      • C:\Users\Admin\AppData\Local\Temp\oarieddh.0.vb

                        Filesize

                        273B

                        MD5

                        3c3d3136aa9f1b87290839a1d26ad07a

                        SHA1

                        005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                        SHA256

                        5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                        SHA512

                        fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                      • C:\Users\Admin\AppData\Local\Temp\oarieddh.cmdline

                        Filesize

                        173B

                        MD5

                        ad037f990790f05adeca765452511c86

                        SHA1

                        56f269d9877051c55604c0e18c000d63a8dcefdb

                        SHA256

                        a241d009e79ea3b1d6b106b37827881703ca8c192ffaae7b0043c13c5b6a567f

                        SHA512

                        6985ae1cc8cec78209e80225eac38a5cf774bcdf8e45bc641eb2902efcfe5197d4c8da7666c5285e049825ff993db924ebea123b37df09e772737284c8a448d6

                      • C:\Users\Admin\AppData\Local\Temp\oqavsq4p.0.vb

                        Filesize

                        264B

                        MD5

                        5ce3977a153152978fa71f8aa96909e9

                        SHA1

                        52af143c553c92afc257f0e0d556908eaa8919cb

                        SHA256

                        e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                        SHA512

                        eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                      • C:\Users\Admin\AppData\Local\Temp\oqavsq4p.cmdline

                        Filesize

                        164B

                        MD5

                        12ced157cf328398eae3b1046ebfb2c9

                        SHA1

                        702d2868525f82fd78ea1bfab050abf6e920507b

                        SHA256

                        b005904b2b8a9f6efd51c538b8f5a43745a80eb34d1bfe7353cf6269ab5d6f9f

                        SHA512

                        3bbc91ad78350ed653a4077ea7db265073f77a6e30b73398a0ea643fad92a84eea5744d7a75935cdd926502cd03ee1f215cb52966e4f9a5cac53721ca51c1176

                      • C:\Users\Admin\AppData\Local\Temp\rxaoh_av.0.vb

                        Filesize

                        266B

                        MD5

                        debab8fb1bbcbf74ca2ac313d4d5aa7d

                        SHA1

                        2a4058378b3df8ef9aa547d1511a425ef043d848

                        SHA256

                        0f1d45b4fd6c36693c7d96bda036a41dccffa4313b92940df6ad180982607744

                        SHA512

                        8beaad01c2f7541532842aca72324eeee7c582d50db2454bab3288dcb2922fdc1f2a0a3e2347a74e744e92c9f8304916c0f52a18754d2e3a5eb2fe6f9fbf6567

                      • C:\Users\Admin\AppData\Local\Temp\rxaoh_av.cmdline

                        Filesize

                        166B

                        MD5

                        e4332a0db551dfa6b721ba34d86ab122

                        SHA1

                        c5acc14b39d9f76ea8056eefd237cfd722e63020

                        SHA256

                        5cf76e6b86b5bb8552d86350f3e601ae613ea6b4a4032e7d4e0b350ff96d012f

                        SHA512

                        ea186df1ab5620d9cdf8abd6316cedd5dcdf627ba2b47ea7303c5fb4821cf1fb0efcb17b3a5cb4247c44196fe449c9e99bb57d577ec9a11059495bc778b4adc7

                      • C:\Users\Admin\AppData\Local\Temp\vbcFC1A.tmp

                        Filesize

                        668B

                        MD5

                        3906bddee0286f09007add3cffcaa5d5

                        SHA1

                        0e7ec4da19db060ab3c90b19070d39699561aae2

                        SHA256

                        0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                        SHA512

                        0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                      • C:\Users\Admin\AppData\Local\Temp\vbcFCA7.tmp

                        Filesize

                        684B

                        MD5

                        41857ef7e71c255abd4d5d2a9174e1a6

                        SHA1

                        95051d6ae43ff1bd9e5ebc95aa2e7b7c3165cb6c

                        SHA256

                        dfcdf12316f3b523895ec611d8e8d9fdc189ab8dde4e86fb962541aeac54e302

                        SHA512

                        ec6c5a7729d273be3ff194ffe47056731ab4100e298b7f50108a2599be59c84bd1953a90c4d7390c477257986a18d336d951f590b782f1aa983de7bd4c86e6ac

                      • C:\Users\Admin\AppData\Local\Temp\vbcFCD6.tmp

                        Filesize

                        684B

                        MD5

                        453916f7e3952d736a473b0e2eea5430

                        SHA1

                        b79ccb2b555a81b8db470ec9fcaea26d42ef1c8b

                        SHA256

                        b0f8b94a35a12060c70e9f81641be22cbf1f1794c73260f48a2e6e46608623fe

                        SHA512

                        86d32a03cf04ef8640075c82e5fecb23034413a41b80b81c900a423b03f44589f774f68f83561465e7c9ce46512c818eef5a90e5ed9f7b3f86b592be34fa367f

                      • C:\Users\Admin\AppData\Local\Temp\vbcFD14.tmp

                        Filesize

                        700B

                        MD5

                        6ed26221ebae0c285cdced27b4e4dbac

                        SHA1

                        452e9440a9c5b47a4f54aefdde36c08592e17a38

                        SHA256

                        aacdfb10fa949c74577bb1778fe2f3bab88b3e587c07cfffb003e059097e9e6c

                        SHA512

                        c604368a7b4adfbec5b6898c8880ea684bd085d967c1ebd087c9bed065fe3e2575c8298a9ccaa454d68496386667db998e2a04248dda2ab35905c8a9b1135cce

                      • C:\Users\Admin\AppData\Local\Temp\vbcFD81.tmp

                        Filesize

                        748B

                        MD5

                        b548259248343e12d417d6c938cf8968

                        SHA1

                        19703c388a51a7ff81a3deb6a665212be2e6589a

                        SHA256

                        ab2ce0a14c78f836d2b134a37183b6d89a78b964ea5607940fa5d940d32a0366

                        SHA512

                        73a3902f000a042a448446f6851d6ad61a30bfdfed7d7903b5dad0f368ee43cd6da3b8ba817ac95be1a7427902aba0642af8ccddc4d442867465f1f1f5bf6f81

                      • C:\Users\Admin\AppData\Local\Temp\vbcFDA0.tmp

                        Filesize

                        676B

                        MD5

                        ba2c43095c1c82b8024e968d16bee036

                        SHA1

                        41ea006dbc9f0f6e80941d7547a980a1dde868e0

                        SHA256

                        1209067183104b41f03a5be0f377dc1865155cc84bdb509b871b7ce3366aae72

                        SHA512

                        00dc93cdb8c4cb0a681f99d24c59216a721bce963d76bad972e29cf92aafd74e4af46632c00f5aef4ce3160927db9df8aa9a8926ea4a5cb6974b499785569e61

                      • C:\Users\Admin\AppData\Local\Temp\vbcFDDF.tmp

                        Filesize

                        644B

                        MD5

                        dac60af34e6b37e2ce48ac2551aee4e7

                        SHA1

                        968c21d77c1f80b3e962d928c35893dbc8f12c09

                        SHA256

                        2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                        SHA512

                        1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                      • C:\Users\Admin\AppData\Local\Temp\vbcFE5C.tmp

                        Filesize

                        684B

                        MD5

                        7a707b422baa7ca0bc8883cbe68961e7

                        SHA1

                        addf3158670a318c3e8e6fdd6d560244b9e8860e

                        SHA256

                        453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                        SHA512

                        81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                      • C:\Users\Admin\AppData\Local\Temp\z7okm4vu.0.vb

                        Filesize

                        265B

                        MD5

                        cbdf61e7858f1274d58258756e185765

                        SHA1

                        15f0d177b5924a5176ff82f0b79bfa3db558145c

                        SHA256

                        d0aa53536d1316c420848db8bb089b24f9669f1baf3be092a7e0f0a0bc1b997d

                        SHA512

                        ab21cbb170e38a2600db2587ce92b74499107e361d55bbcd5e6281568307ffb1c087aba905c042e2e8960e2e554c84057a197dc4c03121b682868def94c5a038

                      • C:\Users\Admin\AppData\Local\Temp\z7okm4vu.cmdline

                        Filesize

                        165B

                        MD5

                        3a510b06ebe8f1d5285b9c993aa7f64f

                        SHA1

                        d3a511023e39ae947865bbf00a7d06d73a16e2e4

                        SHA256

                        ab20fd53fc4b458afc266502d2630eab54893e272b855f6f01a1d83d493e91ba

                        SHA512

                        0831946d2ded49236d22fad07ecb17ab09839a9354444cf64c4fa3bc1ae073f267061c5551f2cf320eae5f7ac55b195df3cf6b1d890fd23d88bf758a1d6848b8

                      • C:\Users\Admin\AppData\Local\Temp\zaf-3cwi.0.vb

                        Filesize

                        271B

                        MD5

                        b19384e98248a2c238e2360d2fecf049

                        SHA1

                        25f5ab6303d0a81f4ef3cc44c0bb53dd3e564fad

                        SHA256

                        296feb4019e37af5174b813d3ac19fa1b17c4db9ad91b06eba610939983e3262

                        SHA512

                        e9e4dd4a302d643fd1d0dd46d058ca7a45c8e6d8b299c129e1a412d1d3309cfe4d4da6f9d893460dde7e96c40414d65e02dbab9c1411dd945581e749ae8438e4

                      • C:\Users\Admin\AppData\Local\Temp\zaf-3cwi.cmdline

                        Filesize

                        171B

                        MD5

                        554709cd4a37bb2acd6e5904116e61c7

                        SHA1

                        750efede23f747485c73eb2780e9510174b44135

                        SHA256

                        267c96c306850628e76a197fb596a34d22dc263de7e4636fdf5937e00ea8a78c

                        SHA512

                        46bc3e82dbc687650d4a9375ab9500bb2f13cda43db0ca45297a9736630ea07680a471daa3d2e495d0cd4958b9c194ee164a78510c668c79196709d53ace3a4f

                      • C:\Windows\System32\MSSCS.exe

                        Filesize

                        21KB

                        MD5

                        6fe3fb85216045fdf8186429c27458a7

                        SHA1

                        ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                        SHA256

                        905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                        SHA512

                        d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                      • memory/340-3-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/340-0-0x000007FEF5ACE000-0x000007FEF5ACF000-memory.dmp

                        Filesize

                        4KB

                      • memory/340-1-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/340-12-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/340-2-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2216-26-0x0000000002630000-0x0000000002638000-memory.dmp

                        Filesize

                        32KB

                      • memory/2216-25-0x000000001B500000-0x000000001B7E2000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2772-11-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2772-13-0x000007FEF5810000-0x000007FEF61AD000-memory.dmp

                        Filesize

                        9.6MB