Resubmissions

01/04/2025, 21:24

250401-z8184awycs 10

Analysis

  • max time kernel
    891s
  • max time network
    900s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/02/2025, 05:50

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Extracted

Family

revengerat

Botnet

XDSDDD

C2

84.91.119.105:333

Mutex

RV_MUTEX-wtZlNApdygPh

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2308
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jrph2tzn.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1CF4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1CF3.tmp"
          4⤵
            PID:1980
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6xesfxzl.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2948
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1D42.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1D41.tmp"
            4⤵
              PID:2112
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dz4qy75b.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1240
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1DFD.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1DFC.tmp"
              4⤵
                PID:2052
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\huun25pq.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1956
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1E6A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1E69.tmp"
                4⤵
                  PID:1124
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\02sv4ljr.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:852
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1EB8.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1EB7.tmp"
                  4⤵
                    PID:1764
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ikbccq7n.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1740
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1EE7.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1EE6.tmp"
                    4⤵
                      PID:1788
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\elb-jps5.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1320
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1F35.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1F34.tmp"
                      4⤵
                        PID:1508
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ja1kvhb_.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:324
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1F64.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1F63.tmp"
                        4⤵
                          PID:588
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\j7ab2nsa.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1944
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1F93.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1F92.tmp"
                          4⤵
                            PID:1396
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kqg1w0qa.cmdline"
                          3⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1928
                          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1FD1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1FD0.tmp"
                            4⤵
                              PID:2116

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\02sv4ljr.0.vb

                        Filesize

                        271B

                        MD5

                        ac972015bef75b540eb33503d6e28cc2

                        SHA1

                        5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                        SHA256

                        fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                        SHA512

                        36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                      • C:\Users\Admin\AppData\Local\Temp\02sv4ljr.cmdline

                        Filesize

                        171B

                        MD5

                        d416108a444d7dc395062cbbca54bc31

                        SHA1

                        407ee3e819d30b042f902968a0d88f69e5c4d4da

                        SHA256

                        246cc128799350ab8375af4c6c6ba765fd37d35bc93bc5cdf89bc2c18b480bd3

                        SHA512

                        30ea4fc4232276628774f456e2fd157a8d2b979969b0932ff5c2b1ba252773f2f3e4f657f229d8f6770b62bfd063ff09c8252b86be432cf5d10419f7841bf61d

                      • C:\Users\Admin\AppData\Local\Temp\6xesfxzl.0.vb

                        Filesize

                        266B

                        MD5

                        debab8fb1bbcbf74ca2ac313d4d5aa7d

                        SHA1

                        2a4058378b3df8ef9aa547d1511a425ef043d848

                        SHA256

                        0f1d45b4fd6c36693c7d96bda036a41dccffa4313b92940df6ad180982607744

                        SHA512

                        8beaad01c2f7541532842aca72324eeee7c582d50db2454bab3288dcb2922fdc1f2a0a3e2347a74e744e92c9f8304916c0f52a18754d2e3a5eb2fe6f9fbf6567

                      • C:\Users\Admin\AppData\Local\Temp\6xesfxzl.cmdline

                        Filesize

                        166B

                        MD5

                        eb2ff26e00b815fa53a358cf874a7671

                        SHA1

                        bb4576e94ce7d6e4f0aaff5efa8e83ed6bc044de

                        SHA256

                        5c5b0f04e4ccbad97d2e2717624160b21751f35bd077c2032d6a96223495b43d

                        SHA512

                        9aea482248a4f0fc551e87fe66417c6bb3abdc7c88a0ca27292217330e7881ddbcaaa3f406ead4c72508298775efbdbd1dc26350f629fc22eccd4c85ae1cad52

                      • C:\Users\Admin\AppData\Local\Temp\RES1CF4.tmp

                        Filesize

                        1KB

                        MD5

                        aedc0ffeb8d957a595e530419a2f1bad

                        SHA1

                        9c495b96b2075027ac63faf9e67e3c6f4fc75894

                        SHA256

                        4bda855881cbca65bdf93d56a1291f93d84ca3dd2a5b65b09b553d7fd9a80a3c

                        SHA512

                        47e2d009c3da5d328e7f8ec8dd211d78ba711277a160fdfa1e120e4ef84b56a9dcc2afe3d733f0ea9482e292fd1b8613817634e76b459873aac7588adcf858a0

                      • C:\Users\Admin\AppData\Local\Temp\RES1D42.tmp

                        Filesize

                        1KB

                        MD5

                        86e2086136edb684d0495f4aaf5c4a2f

                        SHA1

                        2277a85ed17fa0ed767f7d5f4b432d576ed9accb

                        SHA256

                        2b9aeeb2081dc53127310977b4e4e87aea801a8d420c632920c131a38a075562

                        SHA512

                        0704bca3ade34c8777e41ede9e17b8bd0b6fc058fe1d1f3834492230e1d86ba063d3f86d5adb2e7503389e94f258dd6813706e9955525e2c42a08316a817d11e

                      • C:\Users\Admin\AppData\Local\Temp\RES1DFD.tmp

                        Filesize

                        1KB

                        MD5

                        0b0ddb975c91fa840df4fcfa66e17809

                        SHA1

                        d34d813a0544b887bd9456ea73cad1d53ae07193

                        SHA256

                        73c40f8e7aee9e5af1c6e755b6030a05adff60b0d983b9ba310f81478aeb41f8

                        SHA512

                        770b0134298e541fa97465db68f135bfafb7606b548428c0fa67a2e9d39320bde56ca076289fdd57a5dde213fb4eda76ce5d6c6477d83f8c91a404493cdc8bc7

                      • C:\Users\Admin\AppData\Local\Temp\RES1E6A.tmp

                        Filesize

                        1KB

                        MD5

                        5c4bf333360cdbaf982e01825ce660a2

                        SHA1

                        251885e3effc446da630b1dc02ec290e04b1261d

                        SHA256

                        db2c46faacbf4aceb8d9c011cd881f5e6968e0743c734e7f2b1e2d5771a5f55c

                        SHA512

                        3d6173ceba90a1a0a70b8e172d1fe9b817f0db72507c5c3ee1d590bcffce134439f4380a86f07bf11498a0d7a4bd3a2dfcd6785e5e4844a112c663fe1b6ba806

                      • C:\Users\Admin\AppData\Local\Temp\RES1EB8.tmp

                        Filesize

                        1KB

                        MD5

                        379d88d84f1cadf1a154d3f3e098c8e3

                        SHA1

                        ddcd9cb069acf4f7d5acf63b43b11608acdc2e4b

                        SHA256

                        d03cf0cc9656b7b2417d2af434505501b74464cbcea8ebe5f7c0cb8a22f0abb5

                        SHA512

                        c63ca98c44e71616cd0cb9b4d9d8b00bf3844046bd55ff0b7c86345786533aa701d30255abe66880d131815cde7e9033100d4ee1c04402046776795d9a385356

                      • C:\Users\Admin\AppData\Local\Temp\RES1EE7.tmp

                        Filesize

                        1KB

                        MD5

                        1d3e865644c83b69803a2d6d9b329743

                        SHA1

                        9c2aa76fbd546afe20a35f9ccfcb3fece0b4958f

                        SHA256

                        4c3eb0a0b6f473dd4f7e0a83425d0925ab0f3c1a47a003da4ef3fea02dd5be12

                        SHA512

                        a87844ddce09271635abc2593ace8d0f8dc4ad9565cccdaf5779c09fd5533e988a5b6cbab25f7aef9478ff11c47ef9a44e4dca7112f15ca7ba52f22e4e0cfa3c

                      • C:\Users\Admin\AppData\Local\Temp\RES1F35.tmp

                        Filesize

                        1KB

                        MD5

                        59a9468f73b326c60ea1e848d644a479

                        SHA1

                        a989aaba83433980b58fe960715918ba94d5a433

                        SHA256

                        2cc6b7e47207894f4dae4e6e2890e0129d165e66f187116df6275ff080f2c50f

                        SHA512

                        974feef84afae076edf2922a4a7801f0fd47e502d4b7ba4736eeed9f463aeffdd5f86d920576e7eff7e40b066889b867f7cc5ce91930ae32bccdc4062d1e085a

                      • C:\Users\Admin\AppData\Local\Temp\RES1F64.tmp

                        Filesize

                        1KB

                        MD5

                        a232648ddefc65545dd2067e2d77bad2

                        SHA1

                        35b39568c79f0d443c48a9085fd474a36d6a5804

                        SHA256

                        e32284a99aa2f7b6ca30993c019d6480a640d1b0dd9aaf2b58501ed67ac6b9dd

                        SHA512

                        76ab11802be8f958c3f6b9b0cd87bb09672a6eb782864bd08ee5fb4b4548dd42534327860b31d784e499fec31bb4f54a407e561ba5ff5324333dc20d9a7e2cf1

                      • C:\Users\Admin\AppData\Local\Temp\RES1F93.tmp

                        Filesize

                        1KB

                        MD5

                        3f2e564b8e35a1cb260f192f97a021a6

                        SHA1

                        9a59c9557f4b5db1c3fd5b014291982169d3bdfd

                        SHA256

                        c6227aadaf76217f3f2f97164d4678f61ed79550e302685507cb5b424a2a6317

                        SHA512

                        5692a0521131fe2f073bb1ea927be5ccf9da8d94d8d2aa968537484e3edbcd171e365713c13870201300d69bd1e24a359ca1022d9ca1101a3a222df8d674d08c

                      • C:\Users\Admin\AppData\Local\Temp\RES1FD1.tmp

                        Filesize

                        1KB

                        MD5

                        10ddd123546b0d4b236c49bd307ebdf6

                        SHA1

                        28dbccc9bd6708c93e65950cb9a588fbd7a2edba

                        SHA256

                        027ff4a404883312d2e232c213c2e1daf5809dfa08a66cc9b6df47c7b5e5a451

                        SHA512

                        94049568833ab37b5fc3e6a2c7312e962a0c5e24db3af757371d02d743b5e4623732cd73d79a921406b702e553e89069359ba78ec605c1e3a79581a031a20d7d

                      • C:\Users\Admin\AppData\Local\Temp\dz4qy75b.0.vb

                        Filesize

                        265B

                        MD5

                        cbdf61e7858f1274d58258756e185765

                        SHA1

                        15f0d177b5924a5176ff82f0b79bfa3db558145c

                        SHA256

                        d0aa53536d1316c420848db8bb089b24f9669f1baf3be092a7e0f0a0bc1b997d

                        SHA512

                        ab21cbb170e38a2600db2587ce92b74499107e361d55bbcd5e6281568307ffb1c087aba905c042e2e8960e2e554c84057a197dc4c03121b682868def94c5a038

                      • C:\Users\Admin\AppData\Local\Temp\dz4qy75b.cmdline

                        Filesize

                        165B

                        MD5

                        24291fa91b1442ba8e707c419c229309

                        SHA1

                        04949395f15870801e1a4ad20c51b048e0e65a75

                        SHA256

                        16cd6bb7317b00a8212aee1c87b28a9a8206317e81570c2e4256889413638e31

                        SHA512

                        1420f704a53f35b2b0ee70db391809305d5d4db5faeba73d839b35b691fa0482f12b5e8bafee47494d892ba897550d8686e2f728426534feec6de5b00f3a7345

                      • C:\Users\Admin\AppData\Local\Temp\elb-jps5.0.vb

                        Filesize

                        271B

                        MD5

                        b19384e98248a2c238e2360d2fecf049

                        SHA1

                        25f5ab6303d0a81f4ef3cc44c0bb53dd3e564fad

                        SHA256

                        296feb4019e37af5174b813d3ac19fa1b17c4db9ad91b06eba610939983e3262

                        SHA512

                        e9e4dd4a302d643fd1d0dd46d058ca7a45c8e6d8b299c129e1a412d1d3309cfe4d4da6f9d893460dde7e96c40414d65e02dbab9c1411dd945581e749ae8438e4

                      • C:\Users\Admin\AppData\Local\Temp\elb-jps5.cmdline

                        Filesize

                        171B

                        MD5

                        cb2c2c60c82688e18bdb7a8ed145f089

                        SHA1

                        8c29b373d1445f23c7ed463c78f609fcec7f2b03

                        SHA256

                        4d63a7f91785a16b6348ca127691d3676220702b73626a36a0e44483433872d6

                        SHA512

                        e4294b803a7723c51b4392a41c0526bc4b8d9bf649e25c5d0936b4930b2250c6b7e7177599a36273861028142a6db4f64a9b7eb42ff8fae1d7597f7974e0471b

                      • C:\Users\Admin\AppData\Local\Temp\huun25pq.0.vb

                        Filesize

                        269B

                        MD5

                        d8ec3923c7b4bf7ae4ba2dd32ba5174f

                        SHA1

                        bd232f852b5428b0360c9708604793deb513c36e

                        SHA256

                        316f5f33d99324745cbdad4dfe3ece93321e270a177f3646d78d72d1f7a1d648

                        SHA512

                        062694e7951b534e5c93d4d2e65c65cc59b9be7f3f1e469b1679d61e03f1770246222009461c6e2a8ddfe41fa367ed6ebd83f53e0a1c3f24db5e97932558ce11

                      • C:\Users\Admin\AppData\Local\Temp\huun25pq.cmdline

                        Filesize

                        169B

                        MD5

                        4a902e68f8c54dbb0fa02e659f234d9e

                        SHA1

                        72623ebe0fe64beba82e0c0732baa6bd24401f7b

                        SHA256

                        47ba000573e13f5d0f48fc865493b63e7a32fc822e7eaa4405b0fafbb620642d

                        SHA512

                        4d86ce113d2afc832edbeb9bd5c20b4df759867ae952b34b98d06da2a72fd1ea14725db1d557f611490f4901f5c7cadae7187a531aed54e0d3444932509666ec

                      • C:\Users\Admin\AppData\Local\Temp\ikbccq7n.0.vb

                        Filesize

                        290B

                        MD5

                        ce1182df38f7b4c7a89d1e4d1886b0d8

                        SHA1

                        ba5cdc6e13b761912d14ec042639566eebc23eca

                        SHA256

                        e87616f590de6878e0a1051e52bb968d39bad4c7b086cdaecc064c6aa9582e3a

                        SHA512

                        7be8358cbcefde4b1e1a28480eaea0daf5bbbd25aba3d1bd8c589bad3adb63a90551830efabc6e0d2b01a406e41e44c5797502abc88566694fbff7c2091e05a0

                      • C:\Users\Admin\AppData\Local\Temp\ikbccq7n.cmdline

                        Filesize

                        190B

                        MD5

                        5244518257769ded9f8206f2581abd61

                        SHA1

                        229228ba0b888752d55cf13c436dd2ebddcb96e3

                        SHA256

                        3e9a42d9052fec0bba40bef1ee2716ea144585c8cf66967a5ddd42c2305998f0

                        SHA512

                        ea7e59e8ffbaefe467ab4f3bcac54449063f2780497799be5472a65208b08f94ff88bd24e4dc7386d0a2e7c0e107311d75adc4e4e0d80db7bb8bcf50ff4e6815

                      • C:\Users\Admin\AppData\Local\Temp\j7ab2nsa.0.vb

                        Filesize

                        270B

                        MD5

                        658573fde2bebc77c740da7ddaa4634b

                        SHA1

                        073da76c50b4033fcfdfb37ba6176afd77b0ea55

                        SHA256

                        c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                        SHA512

                        f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                      • C:\Users\Admin\AppData\Local\Temp\j7ab2nsa.cmdline

                        Filesize

                        170B

                        MD5

                        b3ee8d659d0682bbbfe400052697aec6

                        SHA1

                        f72fe05fdd48b41e51cb160f419d308cd2a556ca

                        SHA256

                        b65c93dd3cf9a7b658b5df3167b043d9ca164794605c4aac533b6088b8dd0e8d

                        SHA512

                        9f425e7f0bd7d79b551308be939b9f0871fe8ce7eaad3190f93c11e3b177b9a387d0b8184b11893476f8e04604674d6916f958e590e5db1ce5a3ef0458537307

                      • C:\Users\Admin\AppData\Local\Temp\ja1kvhb_.0.vb

                        Filesize

                        264B

                        MD5

                        5ce3977a153152978fa71f8aa96909e9

                        SHA1

                        52af143c553c92afc257f0e0d556908eaa8919cb

                        SHA256

                        e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                        SHA512

                        eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                      • C:\Users\Admin\AppData\Local\Temp\ja1kvhb_.cmdline

                        Filesize

                        164B

                        MD5

                        4cf0f2fd2275083b47765df245f3832d

                        SHA1

                        2ba24c91ec5cb60da4a30bf4a66a1a2f1fd355ef

                        SHA256

                        059a81f5a1794192db9b9ff0d5c522a6351384573ec71681d79095c7c7d5d740

                        SHA512

                        74a5997b7decd30fc08e67c0648c34671957ec512577abe363e2b9f3ac74fc318cc33a4ad7a18d38182641824ba97e801ab6c19bea4c6d0287d7cfc9c5ab5e49

                      • C:\Users\Admin\AppData\Local\Temp\jrph2tzn.0.vb

                        Filesize

                        262B

                        MD5

                        88cc385da858aaa7057b54eaeb0df718

                        SHA1

                        b108224d4686b5ca3faaeb1c728dfba8740a6eca

                        SHA256

                        08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                        SHA512

                        4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                      • C:\Users\Admin\AppData\Local\Temp\jrph2tzn.cmdline

                        Filesize

                        162B

                        MD5

                        2e067df066fa741ee98d266851dd67ff

                        SHA1

                        f2684310fe495d5315b148af3b4a71549935ae98

                        SHA256

                        9a4d279e0d477b79c91d8072cb65225581e2f7db1cd44f18f09cc83db77ed3e3

                        SHA512

                        1ce66b3b0b78b1cddb09183d22430e8a76b90b7ab011b4f8391af0d76bb3bf39f16f08937117ce7d6cbef3ab2ddaf62c6a0bf559da343d45ddbf576b58fdd1a7

                      • C:\Users\Admin\AppData\Local\Temp\kqg1w0qa.0.vb

                        Filesize

                        273B

                        MD5

                        3c3d3136aa9f1b87290839a1d26ad07a

                        SHA1

                        005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                        SHA256

                        5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                        SHA512

                        fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                      • C:\Users\Admin\AppData\Local\Temp\kqg1w0qa.cmdline

                        Filesize

                        173B

                        MD5

                        5105976f97a498a85826d7f8b004f3b7

                        SHA1

                        313e5242a866fc53c3b6c5ed284e4c2570926a9a

                        SHA256

                        90a23cc2469b38984cc157b5bafe3a1e971484ba2635f02b01a8b6ae2388555e

                        SHA512

                        b1f7c0f92947a9003e554c936bb3eb054a107eb464e998ed281acc242ad3dba352f8915af6c260535eb9adb7d9169568699af55eac2e61035c003b1473f59c6e

                      • C:\Users\Admin\AppData\Local\Temp\vbc1CF3.tmp

                        Filesize

                        668B

                        MD5

                        3906bddee0286f09007add3cffcaa5d5

                        SHA1

                        0e7ec4da19db060ab3c90b19070d39699561aae2

                        SHA256

                        0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                        SHA512

                        0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                      • C:\Users\Admin\AppData\Local\Temp\vbc1D41.tmp

                        Filesize

                        684B

                        MD5

                        41857ef7e71c255abd4d5d2a9174e1a6

                        SHA1

                        95051d6ae43ff1bd9e5ebc95aa2e7b7c3165cb6c

                        SHA256

                        dfcdf12316f3b523895ec611d8e8d9fdc189ab8dde4e86fb962541aeac54e302

                        SHA512

                        ec6c5a7729d273be3ff194ffe47056731ab4100e298b7f50108a2599be59c84bd1953a90c4d7390c477257986a18d336d951f590b782f1aa983de7bd4c86e6ac

                      • C:\Users\Admin\AppData\Local\Temp\vbc1DFC.tmp

                        Filesize

                        684B

                        MD5

                        453916f7e3952d736a473b0e2eea5430

                        SHA1

                        b79ccb2b555a81b8db470ec9fcaea26d42ef1c8b

                        SHA256

                        b0f8b94a35a12060c70e9f81641be22cbf1f1794c73260f48a2e6e46608623fe

                        SHA512

                        86d32a03cf04ef8640075c82e5fecb23034413a41b80b81c900a423b03f44589f774f68f83561465e7c9ce46512c818eef5a90e5ed9f7b3f86b592be34fa367f

                      • C:\Users\Admin\AppData\Local\Temp\vbc1E69.tmp

                        Filesize

                        700B

                        MD5

                        6ed26221ebae0c285cdced27b4e4dbac

                        SHA1

                        452e9440a9c5b47a4f54aefdde36c08592e17a38

                        SHA256

                        aacdfb10fa949c74577bb1778fe2f3bab88b3e587c07cfffb003e059097e9e6c

                        SHA512

                        c604368a7b4adfbec5b6898c8880ea684bd085d967c1ebd087c9bed065fe3e2575c8298a9ccaa454d68496386667db998e2a04248dda2ab35905c8a9b1135cce

                      • C:\Users\Admin\AppData\Local\Temp\vbc1EE6.tmp

                        Filesize

                        748B

                        MD5

                        b548259248343e12d417d6c938cf8968

                        SHA1

                        19703c388a51a7ff81a3deb6a665212be2e6589a

                        SHA256

                        ab2ce0a14c78f836d2b134a37183b6d89a78b964ea5607940fa5d940d32a0366

                        SHA512

                        73a3902f000a042a448446f6851d6ad61a30bfdfed7d7903b5dad0f368ee43cd6da3b8ba817ac95be1a7427902aba0642af8ccddc4d442867465f1f1f5bf6f81

                      • C:\Users\Admin\AppData\Local\Temp\vbc1F34.tmp

                        Filesize

                        676B

                        MD5

                        ba2c43095c1c82b8024e968d16bee036

                        SHA1

                        41ea006dbc9f0f6e80941d7547a980a1dde868e0

                        SHA256

                        1209067183104b41f03a5be0f377dc1865155cc84bdb509b871b7ce3366aae72

                        SHA512

                        00dc93cdb8c4cb0a681f99d24c59216a721bce963d76bad972e29cf92aafd74e4af46632c00f5aef4ce3160927db9df8aa9a8926ea4a5cb6974b499785569e61

                      • C:\Users\Admin\AppData\Local\Temp\vbc1F63.tmp

                        Filesize

                        644B

                        MD5

                        dac60af34e6b37e2ce48ac2551aee4e7

                        SHA1

                        968c21d77c1f80b3e962d928c35893dbc8f12c09

                        SHA256

                        2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                        SHA512

                        1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                      • C:\Users\Admin\AppData\Local\Temp\vbc1FD0.tmp

                        Filesize

                        684B

                        MD5

                        7a707b422baa7ca0bc8883cbe68961e7

                        SHA1

                        addf3158670a318c3e8e6fdd6d560244b9e8860e

                        SHA256

                        453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                        SHA512

                        81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                      • C:\Windows\System32\MSSCS.exe

                        Filesize

                        21KB

                        MD5

                        6fe3fb85216045fdf8186429c27458a7

                        SHA1

                        ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                        SHA256

                        905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                        SHA512

                        d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                      • memory/2308-26-0x0000000001D90000-0x0000000001D98000-memory.dmp

                        Filesize

                        32KB

                      • memory/2308-24-0x000000001B7A0000-0x000000001BA82000-memory.dmp

                        Filesize

                        2.9MB

                      • memory/2348-4-0x000007FEF5C30000-0x000007FEF65CD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2348-3-0x000007FEF5EEE000-0x000007FEF5EEF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2348-14-0x000007FEF5C30000-0x000007FEF65CD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2348-2-0x000007FEF5C30000-0x000007FEF65CD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2348-0-0x000007FEF5EEE000-0x000007FEF5EEF000-memory.dmp

                        Filesize

                        4KB

                      • memory/2348-1-0x000007FEF5C30000-0x000007FEF65CD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2676-15-0x000007FEF5C30000-0x000007FEF65CD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2676-16-0x000007FEF5C30000-0x000007FEF65CD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2676-13-0x000007FEF5C30000-0x000007FEF65CD000-memory.dmp

                        Filesize

                        9.6MB

                      • memory/2676-12-0x000007FEF5C30000-0x000007FEF65CD000-memory.dmp

                        Filesize

                        9.6MB