Resubmissions

01/04/2025, 21:24

250401-z8184awycs 10

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26/02/2025, 02:02

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3128
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\t26hzkhd.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3948
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES30EF.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA32195CA74244F7EA967A7161F9F4E83.TMP"
          4⤵
            PID:3460
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dub2s8hw.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4364
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES317C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB77FCA852925488A985E4D7063AB116.TMP"
            4⤵
              PID:928
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-ou8b58s.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3020
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3208.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD3F36952B7E44B63AEDF7994F281AA28.TMP"
              4⤵
                PID:2572
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rlszwof-.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:4280
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3285.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc803F905C7E6446FB82268BA625A31BF.TMP"
                4⤵
                  PID:3952
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\zwp7bogb.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2876
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3302.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE69201B067E342DA9143D2AD5ED1F646.TMP"
                  4⤵
                    PID:3808
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rbyazumi.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2576
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES33CD.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5B2B773F4E88461F999D6BD4AD8E8590.TMP"
                    4⤵
                      PID:640
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\uqhgmwmr.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4696
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES342B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc82C645CD917445A1BF320CA66C3B1B.TMP"
                      4⤵
                        PID:1440
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\54if0xrj.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4656
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3489.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE69DF96213434C4E937EC85035548897.TMP"
                        4⤵
                          PID:2804
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\c2bnqu-k.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4144
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES34D7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1DF9630C8B9B426D90FD491741E7F0.TMP"
                          4⤵
                            PID:3432
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\terelaz5.cmdline"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4244
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3525.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc4BC08D0163774B1385A6BA57B29A362.TMP"
                            4⤵
                              PID:708
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\accuc1xx.cmdline"
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3012
                            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3583.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEA09B5013B7E4DFABFC8D96EE0A61D5.TMP"
                              4⤵
                                PID:1836

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Temp\-ou8b58s.0.vb

                          Filesize

                          263B

                          MD5

                          d1110a95f1e40f726584bd99eca52fe7

                          SHA1

                          97fac683e1116ab31a9cc9c3dcfd9fe9e53505c3

                          SHA256

                          00f373eb310beace70146b6e0fd188aa2f437efb2e5a2714a11d4d58e27d3142

                          SHA512

                          f15b5b310ace82a0106b551d71ad3d48e1c75085aa78b8bb3374a2334ceb073bd4d1bf4cd0b4e39034c39f01b6bcd76e8be30198e4872f5641a7d29b255154b4

                        • C:\Users\Admin\AppData\Local\Temp\-ou8b58s.cmdline

                          Filesize

                          163B

                          MD5

                          1c4a4c8a77b893a095e31f8c7afde724

                          SHA1

                          c29406820d13817750fa036ba81d93c8b76d3451

                          SHA256

                          ceb44fa16f2f148ebfe89c8759918d82cbadcbfd283397ad3d57d20115fa775a

                          SHA512

                          ae647f014cacc094a31b9c3c106a2175a88d96584ac20a20c9b0427f8205f9ce9bb0d025050b7d9e87333a49cc7aa09a601e4133136d885afd43ed146f852c34

                        • C:\Users\Admin\AppData\Local\Temp\54if0xrj.0.vb

                          Filesize

                          264B

                          MD5

                          5ce3977a153152978fa71f8aa96909e9

                          SHA1

                          52af143c553c92afc257f0e0d556908eaa8919cb

                          SHA256

                          e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                          SHA512

                          eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                        • C:\Users\Admin\AppData\Local\Temp\54if0xrj.cmdline

                          Filesize

                          164B

                          MD5

                          951ec9bde7dfc16ca174363bdebeb1a1

                          SHA1

                          a4a2eee01c43c76ac72ebd0d6c3975d0c9930455

                          SHA256

                          370bb137835ab22bbd9aa62e5516bb3178d85b3e8a62b3513c0e166d787b7390

                          SHA512

                          e5292802f7ada9b3deb198b4025ae1c3a726f21f89b8455a2aeb4441e86e4bffde40f84ccc628a566df1cedb29844dfdefdbaf397cf0a2c477ef0e6bf0dd5b09

                        • C:\Users\Admin\AppData\Local\Temp\RES30EF.tmp

                          Filesize

                          1KB

                          MD5

                          ba901c9ab74a76007cdb2e15330061c5

                          SHA1

                          903365ae247dddda6fb659db3dc51a738a7e0dbf

                          SHA256

                          e6102dda3bb34475b3cd41393b9074975c0d29bcf6e58b4423a9b518abee8135

                          SHA512

                          26c712407661ae427c903b8f868bd035d2354be042455a8654a2cd6ec35e6f8fa4abafafdf2fc9bd0397b63ac4fb2ebc1296b401b193028c9a32ff88d72d6a7a

                        • C:\Users\Admin\AppData\Local\Temp\RES317C.tmp

                          Filesize

                          1KB

                          MD5

                          d16b59c51d3c22818821fdfb1cb2639c

                          SHA1

                          ceb73a2ec2365fcd9d9e267e72cca8a0bfe2ce76

                          SHA256

                          65643b8099448bed1c416506360c7b7f6aec7fce47bbc7566354bc689debbcaf

                          SHA512

                          fe81c4fde4205ad3b2c2780b4f92c47e26128aa3d735bb302268e3226d9d927575c4e6d3b46a13fcd33a17b4eff9c62b71bbc7cecc7f91770637b62d98cdcb63

                        • C:\Users\Admin\AppData\Local\Temp\RES3208.tmp

                          Filesize

                          1KB

                          MD5

                          3a87524c6d032af303be026964069cb7

                          SHA1

                          cb05d17d9d2905ca34f31777d39e8ac03a659abe

                          SHA256

                          3af039046f04a9a02ef232e3b5afc1f4663332e269cc9e43fcf23bee0e478896

                          SHA512

                          e66e82e299cdd9d3b1e64d94102f28d4e954fe691a2924dec28080ba08a569af248e09b6d0ea148ce5e0b69926245054bf3b9a26145e859ee67d9e6bff9fbaa5

                        • C:\Users\Admin\AppData\Local\Temp\RES3285.tmp

                          Filesize

                          1KB

                          MD5

                          cd9fd87577d67ca506029b7a40f375d2

                          SHA1

                          d7e254bd719e5a7e3736922b8ee118598164b4f1

                          SHA256

                          b0218bf30a1b0e38b1a36aecfdee7f527d278591359fa34017ab591f60b3da9d

                          SHA512

                          437bcdbd84dac0212a3a35497ad978cc30c25cad621e481db90c9126184a2add4f287cfb597abf2136421d5fdd65580cf2e1f19e991cbd3766a04d2d279b5c05

                        • C:\Users\Admin\AppData\Local\Temp\RES3302.tmp

                          Filesize

                          1KB

                          MD5

                          1b97200122cfe3554a587e9c6514b00b

                          SHA1

                          9203cd3d7fb0a4f0d6d938cfdebdf7af50cdf8e2

                          SHA256

                          d4c1884a560ff8f712956b2018d009e1c863ba8c0cf1fb5991acf0708e72f64f

                          SHA512

                          128bba5dc325cafe307436c1d0b6d0152caf9873f3d56fbaf2abc651611ab7a0771f36412f226805817ae585f022852bc8f2062df6d79f13d44d6e347aa6c115

                        • C:\Users\Admin\AppData\Local\Temp\RES33CD.tmp

                          Filesize

                          1KB

                          MD5

                          68ef56fb0de44b3a0b6ff99db97983e9

                          SHA1

                          ecc6bc647dc5ec631db99805fcc38009f2dab3d2

                          SHA256

                          b7cc565a33339214a7e2448429dee049e7c04880d5d18b9e1e8bc2958bf2cffa

                          SHA512

                          905b38baece603ea40cd90272e6d653fc2dbaa8c37fdf898fc9edcfd871a57c7a1da593f56a2b857dba4a48b7f7224d89e25be9923404cf8e03710fa0e519630

                        • C:\Users\Admin\AppData\Local\Temp\RES342B.tmp

                          Filesize

                          1KB

                          MD5

                          e52b79d9833735b08a372bbd89d62b0c

                          SHA1

                          f365dfff9ec72d544a2267fd9c083c724c74bb37

                          SHA256

                          2f8fd768cd74751e3d1a85cb1baf3f3f50ef5d80e25207b8b772c2de79f5de10

                          SHA512

                          238d54ef626c91afac3c7e05f7c3abd638b9e6ff9fab17b1cd7d21504327fa9bb1db0398ce9a05b1194f6a7914f99040a59b0963a99ca24f573348130bdfea9f

                        • C:\Users\Admin\AppData\Local\Temp\RES3489.tmp

                          Filesize

                          1KB

                          MD5

                          7b65b0eb1fc8e2d268e277ea6a92c14d

                          SHA1

                          4cdca4ab4e57ceb549f63c38a5d524cdfdaf0010

                          SHA256

                          d96c75a87f3c17e59e09af6514522ffd6176d9418065b7f7bf1dcc587c503442

                          SHA512

                          af69828d0ffbba3168c0a9648747a0bb11a3fec9d04c82de4b4ebfc717bdc271c89ede1853ad976f06dec73abc0eebcbac8d6cdba87979c191635b67179bad30

                        • C:\Users\Admin\AppData\Local\Temp\RES34D7.tmp

                          Filesize

                          1KB

                          MD5

                          f43a5127f626111a63fd102b4aa408f7

                          SHA1

                          b14f8e5cdb333ac6e8a3de22c4f70a07b07e48f6

                          SHA256

                          30a48b2179282b72e3bc0b6994df2692f061f8001ccf5e1479c79275655f911e

                          SHA512

                          408bbce7c5f0c221be89b033810f5609e00c07e3e976ea1da475f1f1f806c6a0052ec7d7c14db7864055a07ea9452e7a3ca7d558a397dd36a74d22c4335b3b5d

                        • C:\Users\Admin\AppData\Local\Temp\RES3525.tmp

                          Filesize

                          1KB

                          MD5

                          4e5ef00b6b35faee0aecfbc29c87c49c

                          SHA1

                          58a6e37180ba4e47a90578a5b1d03afd156c8891

                          SHA256

                          0a63dee8a0249cdc3162644dc8aeafc8684bc0d75a5b4b25a514d4f5d52a97da

                          SHA512

                          2fb9ecaa667c362ee056124791d277b7cfd53c30e016c84d75676cc2c577ffc192cfb1353c85d403979fd30b3ec6c234143b633a25ba201c83b82f89cf07a746

                        • C:\Users\Admin\AppData\Local\Temp\RES3583.tmp

                          Filesize

                          1KB

                          MD5

                          500f784852fdca72ba79c06414b2ddeb

                          SHA1

                          067d9514f2eb70f9d101c2bf3ac3b2ea329bb652

                          SHA256

                          c491a6ac3b9d11a5acd4db50afe8c5c8636f2232bc8df0517ea8341d6857582f

                          SHA512

                          e2099d15e03ea7d972e1178e42e9b36575ed7b9e181929fc463a02112464dca73213dedd6bc8061592cdb8d22aa0304b1b8bc7bd628b9264a0178e0cc261f678

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_5sj4marf.vzo.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\accuc1xx.0.vb

                          Filesize

                          273B

                          MD5

                          3c3d3136aa9f1b87290839a1d26ad07a

                          SHA1

                          005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                          SHA256

                          5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                          SHA512

                          fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                        • C:\Users\Admin\AppData\Local\Temp\accuc1xx.cmdline

                          Filesize

                          173B

                          MD5

                          daf00a02e8e263de3876ff4a9e91965f

                          SHA1

                          09da7b2a29bf144d84c91f5bd12e3c51af435d9b

                          SHA256

                          6d1f93ea1b6dc709b63dc06e17941a7576aa4c5cfcca8be865bb0feafabff9e3

                          SHA512

                          106a07c7357cab93b75da67d6e7a3f15ad25a82f2806844a839646ce32dce66aa46f435628ccfe40e271b71b4e616b0699f99ce014d51f203472cf01c88adb6d

                        • C:\Users\Admin\AppData\Local\Temp\c2bnqu-k.0.vb

                          Filesize

                          270B

                          MD5

                          658573fde2bebc77c740da7ddaa4634b

                          SHA1

                          073da76c50b4033fcfdfb37ba6176afd77b0ea55

                          SHA256

                          c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                          SHA512

                          f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                        • C:\Users\Admin\AppData\Local\Temp\c2bnqu-k.cmdline

                          Filesize

                          170B

                          MD5

                          a333de6abffb95394c82e35eb9fd4469

                          SHA1

                          0f6fe18961be53e74d4bf377e22179505d5e24fc

                          SHA256

                          bd3c40fb87d49bc2eb51bafacd4f63b1e60e2b797cfe10b760de1c4febde8027

                          SHA512

                          696622e7680fff4e72baeed854ebc41cc4afee2a5afcbaf2a96a927a6cfc4de29a477a05ad13c79012664d8791415694056bc507e94e0ccefd6607a0832794ca

                        • C:\Users\Admin\AppData\Local\Temp\dub2s8hw.0.vb

                          Filesize

                          262B

                          MD5

                          88cc385da858aaa7057b54eaeb0df718

                          SHA1

                          b108224d4686b5ca3faaeb1c728dfba8740a6eca

                          SHA256

                          08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                          SHA512

                          4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                        • C:\Users\Admin\AppData\Local\Temp\dub2s8hw.cmdline

                          Filesize

                          162B

                          MD5

                          64739eb75aa3525cee8c583ba32a8605

                          SHA1

                          b4df058e2e4b7189f1412fb77b4a4b48e0f2d610

                          SHA256

                          349d29ace708f1b1f0850cb337d3d6f75f1414a0021280ae200b63b39d08796d

                          SHA512

                          a77c3d260935138c49893e79a3610d3ad20012c766b5eccd6ff91d4acc5778199ad069fe3753d863b64131d108175a6907c40665beeac60b4b952a8e1fe79d56

                        • C:\Users\Admin\AppData\Local\Temp\rbyazumi.0.vb

                          Filesize

                          271B

                          MD5

                          325f27ef75bebe8b3f80680add1943d3

                          SHA1

                          1c48e211258f8887946afb063e9315b7609b4ee3

                          SHA256

                          034c75813491d628a1a740b45888fc0c301b915456aaa7ba6433b4f1368cda35

                          SHA512

                          e2165b425558872897990953c26e48776f45751a53da035f1ad86ac062ec23a2923b984d84f992de5c0170f6e192feb155ffff25f51bc76ab273b996daacb804

                        • C:\Users\Admin\AppData\Local\Temp\rbyazumi.cmdline

                          Filesize

                          171B

                          MD5

                          8ec9774069b1b4a1cdaf417d156a409f

                          SHA1

                          f5f311815bad79baff8225e42ba73435a82a17f8

                          SHA256

                          1477835bb994c636102c58b1bb52d891997128f0e70732f65db22630fec01e13

                          SHA512

                          4181654e414742a60e6a0eafa5c25288a5a8189048423ec557a759ed2c20fa36e7324b62635d9e246231dc34ca494ad829a230e5b0e975e5f5c8ac91f7382991

                        • C:\Users\Admin\AppData\Local\Temp\rlszwof-.0.vb

                          Filesize

                          271B

                          MD5

                          ac972015bef75b540eb33503d6e28cc2

                          SHA1

                          5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                          SHA256

                          fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                          SHA512

                          36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                        • C:\Users\Admin\AppData\Local\Temp\rlszwof-.cmdline

                          Filesize

                          171B

                          MD5

                          90d0cd0c747d81cbd54e0b45fb0a14d7

                          SHA1

                          744e92fd81334289c10b5ef615570d93a44be4a3

                          SHA256

                          8f2f10cc6e9a65e6b3f422c393dd56dd1c7a96109dbf99e9e086298d38de6de3

                          SHA512

                          4c8efefecfb1aa01c36790944043f5d4f7369ad79700220b817b9f0381e06aa37c1317bd82efd843f108408e6735d0d88726244ae3c3c4affd36cd12199856b2

                        • C:\Users\Admin\AppData\Local\Temp\t26hzkhd.0.vb

                          Filesize

                          256B

                          MD5

                          076803692ac8c38d8ee02672a9d49778

                          SHA1

                          45d2287f33f3358661c3d6a884d2a526fc6a0a46

                          SHA256

                          5b3ab23bcadaeb54a41bdb1636bcaf7772af028d375f42baeb967de6579ef2a3

                          SHA512

                          cc9126384a287ccb99d10d5c2d3034cdbc8a45e94f1cec48dd95f2aa08ebbe3053ffd6d6effa31f2d84164edbb6136398cd02c08b05f027a6a777dffd1daea5d

                        • C:\Users\Admin\AppData\Local\Temp\t26hzkhd.cmdline

                          Filesize

                          156B

                          MD5

                          9a50a6cbdc3801f5132f2574c727facb

                          SHA1

                          f3940d6a9998394823e7f318691a234e35d28ed6

                          SHA256

                          1beefafa423267b2d1668f28735f6dd0bd6031e8bafdd0563eaf414b731e7328

                          SHA512

                          8490aebf5ad3e9a80e35808661b71ef12afaab32d583d582de591196a83c7cf73c54d2f16e4aa03b2ea9515f63000ea8fcdc497728eb511f44a49abae423896a

                        • C:\Users\Admin\AppData\Local\Temp\terelaz5.cmdline

                          Filesize

                          171B

                          MD5

                          2f544b70da2954e3571d86ed7b6bd2ab

                          SHA1

                          84ccfd94d677288b4dd728304fbde0c86561fc94

                          SHA256

                          6b4901cbefd4cc62eb80e22906a50949d81a60337b2f2c4c9bbe3ad672d9a3a4

                          SHA512

                          c7fe9febc607bd9b35396c4c837afce6e8dc9184e36753cae4233863e9c29d20d27ffd8a80dd782f762ebedf83260acba84a978a59cde2f6a4d16a32cad0e97b

                        • C:\Users\Admin\AppData\Local\Temp\uqhgmwmr.0.vb

                          Filesize

                          274B

                          MD5

                          539683c4ca4ee4dc46b412c5651f20f5

                          SHA1

                          564f25837ce382f1534b088cf2ca1b8c4b078aed

                          SHA256

                          ec2210924d5c1af6377ef4bdf76d6ca773aaa1ae0438b0850f44d8c4e16ef92e

                          SHA512

                          df7c1a55e53f9b9bf23d27762d2d1163c78808e9b4d95e98c84c55ca4ecb7009ed58574ae6ddede31459f300483a1dc42987295a04f6c8702f297d3f1942f4ac

                        • C:\Users\Admin\AppData\Local\Temp\uqhgmwmr.cmdline

                          Filesize

                          174B

                          MD5

                          f1c72962f1888e07715c8b387032b13f

                          SHA1

                          ef3f1a1d0acc95549ef8e46908ff5a54cc8bd43e

                          SHA256

                          0b2f7ac87726634d087dfd5659723e2b12565428f960c56af9d8fef8bbd8efe0

                          SHA512

                          b67c8da3a7cec13d9d322b76ee531e7aa3d98c1e59ba2379209b1a90b8b3a61bef140b5719a8d289dcc25a569b8d7323f71c895385e9572327bf6024756a33f6

                        • C:\Users\Admin\AppData\Local\Temp\vbc82C645CD917445A1BF320CA66C3B1B.TMP

                          Filesize

                          684B

                          MD5

                          8135713eeb0cf1521c80ad8f3e7aad22

                          SHA1

                          1628969dc6256816b2ab9b1c0163fcff0971c154

                          SHA256

                          e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a

                          SHA512

                          a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4

                        • C:\Users\Admin\AppData\Local\Temp\vbcA32195CA74244F7EA967A7161F9F4E83.TMP

                          Filesize

                          644B

                          MD5

                          dac60af34e6b37e2ce48ac2551aee4e7

                          SHA1

                          968c21d77c1f80b3e962d928c35893dbc8f12c09

                          SHA256

                          2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                          SHA512

                          1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                        • C:\Users\Admin\AppData\Local\Temp\vbcB77FCA852925488A985E4D7063AB116.TMP

                          Filesize

                          668B

                          MD5

                          3906bddee0286f09007add3cffcaa5d5

                          SHA1

                          0e7ec4da19db060ab3c90b19070d39699561aae2

                          SHA256

                          0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                          SHA512

                          0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                        • C:\Users\Admin\AppData\Local\Temp\vbcD3F36952B7E44B63AEDF7994F281AA28.TMP

                          Filesize

                          676B

                          MD5

                          85c61c03055878407f9433e0cc278eb7

                          SHA1

                          15a60f1519aefb81cb63c5993400dd7d31b1202f

                          SHA256

                          f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b

                          SHA512

                          7099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756

                        • C:\Users\Admin\AppData\Local\Temp\vbcEA09B5013B7E4DFABFC8D96EE0A61D5.TMP

                          Filesize

                          684B

                          MD5

                          7a707b422baa7ca0bc8883cbe68961e7

                          SHA1

                          addf3158670a318c3e8e6fdd6d560244b9e8860e

                          SHA256

                          453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                          SHA512

                          81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                        • C:\Users\Admin\AppData\Local\Temp\zwp7bogb.0.vb

                          Filesize

                          272B

                          MD5

                          2b3aac520562a93ebef6a5905d4765c9

                          SHA1

                          10ab45c5d73934b16fac5e30bf22f17d3e0810c8

                          SHA256

                          b9f0edf067faaaa7da2d47e3d22b957cd302eb25e01e08ea79c664868f328f89

                          SHA512

                          9514934ed12d93ea3ad4e6873cf294bafa114bc7a784a93b14dd2410d07fae3a2c00308035a5c129c57e283de8b94ed36fd9f9de35b08eb79a82a0c732e50446

                        • C:\Users\Admin\AppData\Local\Temp\zwp7bogb.cmdline

                          Filesize

                          172B

                          MD5

                          1842b54ed898570fd6362e7903c38310

                          SHA1

                          de8a079e9f2be050896fda9ac70188de61c29b67

                          SHA256

                          070605e2bc44988a7d19d9c4132da9703d86579b1512069ee83a06e1adeb9d8f

                          SHA512

                          d3d4d7054397f87ee485b171695a6ff3d66e500bc3528c4dba373dba12f4aadad2da27854b338d8dffb0dacab868951a7a68569fd9e3ddd6c2c48ae941d9b25e

                        • C:\Users\Admin\AppData\Roaming\Random\Default\Microsoft Edge.exe

                          Filesize

                          6KB

                          MD5

                          f26eefeef2fef68271a050eb4176f136

                          SHA1

                          efbbefac7f24c27d2dd0f62889a3dd22b203ee65

                          SHA256

                          8af5c376f4d298b007e17313c314ce636e295411b9f3412b4f012a9b1aec2986

                          SHA512

                          5017f029d4b7919a154b670efca86c0c55f4ed2835fe333aa71c8efa0ddff907b0c3368098a024197289f856a13a56b3e0104f54857fbb11a122d9cd7d03db9f

                        • C:\Windows\System32\MSSCS.exe

                          Filesize

                          21KB

                          MD5

                          6fe3fb85216045fdf8186429c27458a7

                          SHA1

                          ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                          SHA256

                          905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                          SHA512

                          d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                        • memory/2176-22-0x00007FFC8BFE0000-0x00007FFC8C981000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/2176-19-0x00007FFC8BFE0000-0x00007FFC8C981000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/2176-18-0x00007FFC8BFE0000-0x00007FFC8C981000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/2176-17-0x00007FFC8BFE0000-0x00007FFC8C981000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/3128-35-0x000001B17A3B0000-0x000001B17A3D2000-memory.dmp

                          Filesize

                          136KB

                        • memory/3180-6-0x000000001C530000-0x000000001C5CC000-memory.dmp

                          Filesize

                          624KB

                        • memory/3180-7-0x00007FFC8C295000-0x00007FFC8C296000-memory.dmp

                          Filesize

                          4KB

                        • memory/3180-8-0x00007FFC8BFE0000-0x00007FFC8C981000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/3180-5-0x000000001BCA0000-0x000000001BD02000-memory.dmp

                          Filesize

                          392KB

                        • memory/3180-0-0x00007FFC8C295000-0x00007FFC8C296000-memory.dmp

                          Filesize

                          4KB

                        • memory/3180-4-0x000000001B120000-0x000000001B1C6000-memory.dmp

                          Filesize

                          664KB

                        • memory/3180-3-0x00007FFC8BFE0000-0x00007FFC8C981000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/3180-2-0x00007FFC8BFE0000-0x00007FFC8C981000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/3180-21-0x00007FFC8BFE0000-0x00007FFC8C981000-memory.dmp

                          Filesize

                          9.6MB

                        • memory/3180-1-0x000000001B6D0000-0x000000001BB9E000-memory.dmp

                          Filesize

                          4.8MB