Resubmissions

01/04/2025, 21:24

250401-z8184awycs 10

Analysis

  • max time kernel
    143s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2025, 21:24

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3320
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\djuqv6sv.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1920
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD1E1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA7E15B34B4B849BD8F9539B0869FD4C7.TMP"
          4⤵
            PID:5300
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\evn0zgch.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:520
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2FB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc93529441DD8D482F8F25F53AE411F0B1.TMP"
            4⤵
              PID:5212
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gnmxkpd_.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3828
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD3C6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2FAAD8D7DBE24FE184C28D84E0BE0.TMP"
              4⤵
                PID:3212
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\asknxqhl.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:5004
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD491.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1ED37BA34FAE4059B448EA051D8947E.TMP"
                4⤵
                  PID:3588
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ln72_bos.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:2072
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD53D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDDEADAB6145D4C91A0EE8BF372CCE11B.TMP"
                  4⤵
                    PID:1216
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\8jajaffl.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5856
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD5BA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFB19B664F5D48AD815C2D68CEF2A47F.TMP"
                    4⤵
                      PID:436
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\c5ryho6u.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2044
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD637.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc53EE183E6EE043FCB3E925F9F25564A2.TMP"
                      4⤵
                        PID:1244
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\qd373hlw.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1440
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD6B4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcBF1B7522A0B243D0856E5EFD1256F180.TMP"
                        4⤵
                          PID:4364
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\1ynojunb.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:724
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD702.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc82D708AF53594BA89ACBF386CF349475.TMP"
                          4⤵
                            PID:2664

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\1ynojunb.0.vb

                      Filesize

                      273B

                      MD5

                      3c3d3136aa9f1b87290839a1d26ad07a

                      SHA1

                      005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                      SHA256

                      5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                      SHA512

                      fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                    • C:\Users\Admin\AppData\Local\Temp\1ynojunb.cmdline

                      Filesize

                      173B

                      MD5

                      32e0c29b77edb081232d317a56f40322

                      SHA1

                      e7b6611fbc0ca5e2dc100afc35d06eb748bebf59

                      SHA256

                      9f456bbd7aea55475523e7000eb36f3b8f91448d973fc362327c81f5b770bf26

                      SHA512

                      4f62892d014abc370bf9c9e553352a25b9e1bc2dcb7547bd2e70dbc7bf0b994d6f0624998193ad7346b19c5fd71bb022237ea86b03535763e8dba20bab66b26c

                    • C:\Users\Admin\AppData\Local\Temp\8jajaffl.0.vb

                      Filesize

                      264B

                      MD5

                      5ce3977a153152978fa71f8aa96909e9

                      SHA1

                      52af143c553c92afc257f0e0d556908eaa8919cb

                      SHA256

                      e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                      SHA512

                      eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                    • C:\Users\Admin\AppData\Local\Temp\8jajaffl.cmdline

                      Filesize

                      164B

                      MD5

                      e7d32f4c97dc107cc0ec9e92d4000a3b

                      SHA1

                      a07bc718f82792fcd10b21ebc8161858f468f15d

                      SHA256

                      936b8fb3302d7189bd746f05533306810b3a41157136d054afaacd317ceec8c4

                      SHA512

                      1b9cc93bd30db33658bc295064627c30f689817a3eab351b17f6a2b88c9e2cfb3f31bc1e6f89acbf4e047e1d42acbb7ae23f2dc0740d292d5057f258be716ddc

                    • C:\Users\Admin\AppData\Local\Temp\RESD1E1.tmp

                      Filesize

                      1KB

                      MD5

                      8f38e5e32bc3534df0af75b8fdfa6402

                      SHA1

                      dbc46d5c30531922b781b332d931e25e1b9287c1

                      SHA256

                      10c9beb8e67c0eed9c4815e0f54d77877136a148b694c84466d60126247b78aa

                      SHA512

                      27b955e4f9d58c494e261ec429610c3599a79c05fd34221a4acf80be7386c1505119572cb65e2b25b96121fd4a957e3c601e9f954dffb7b5db6969c8ba923196

                    • C:\Users\Admin\AppData\Local\Temp\RESD2FB.tmp

                      Filesize

                      1KB

                      MD5

                      a9d15c8b494d9706fd9c4ed229409608

                      SHA1

                      a427080f83f2aec581c207563ae36fae54feb11b

                      SHA256

                      3c7e160eb47b89aa60e19ce9a875dd2e5b0c7ff74143180693c561ec647b0d3c

                      SHA512

                      94f2119d974b9f82a8b3d8986177b70c9be5eca0a4b2d1edf648a6e5ed0e848fa419515d5d4ce7935751cab92eda511fe6ad40b5df660fcbcc8037928f819c5b

                    • C:\Users\Admin\AppData\Local\Temp\RESD3C6.tmp

                      Filesize

                      1KB

                      MD5

                      e29bb1b790f51af9edfbf330b02a1b19

                      SHA1

                      12945e361fd8281919f267f34e8ed8735bafc992

                      SHA256

                      b8d9260b834bdbe68d6ff30fbcfb1433028d8170759b8e2f459e798bbef49777

                      SHA512

                      e0896e74b4291eb9e466fe0a7efc09f7fde093fe4a844304cb031eb413877faaa05fc2f82c21f645ec8db22ab268c1b54758b58b2494b805d02f7f4866c3b53f

                    • C:\Users\Admin\AppData\Local\Temp\RESD491.tmp

                      Filesize

                      1KB

                      MD5

                      b5ed20fe9c9352055a49c8d44e1074b1

                      SHA1

                      e840582377ac54088a2797ba9e325b4d902cc830

                      SHA256

                      bebf4ea09a1228749538775b6966a0568dec8c5fad0d27e86927bb4463d7bc9c

                      SHA512

                      662b873e499ef837d782858923f3e0f869cc0df8b48fd46ca136d18b11ee0533e24055dbef00ca4e27d9a1b0859b5944f2350e0f210d7d03b185aa98929dd6ae

                    • C:\Users\Admin\AppData\Local\Temp\RESD53D.tmp

                      Filesize

                      1KB

                      MD5

                      46cf3c9e908adfae156cefe3baa6254b

                      SHA1

                      35fed3f9e897bb6d0a5b520b0e123122dea984be

                      SHA256

                      60f1e657e5e3f9e6bbdc0bd15c28784b990f6410aa84a918c6140d3ebdd8e3c4

                      SHA512

                      d25760acff60e84aa4d9f22ba2fc48d2fc39b3a90d87517b6f21c216c0d3ea66e27a26958c7a14f3f0422576ed5582ec6607ffd99205673517f727940db3c8c9

                    • C:\Users\Admin\AppData\Local\Temp\RESD5BA.tmp

                      Filesize

                      1KB

                      MD5

                      9e3a804466ca6e27f0ed5f6f744a1651

                      SHA1

                      d8ffc7bba73d3be5a4874a20e029cf9717492f98

                      SHA256

                      7878a5781d154e69f16aad6c306f5bd1e7d73d2602e7ac06288c29f31652aee6

                      SHA512

                      96f76a43fa9242859cb22340a38d9eb1c359a282d1aa681f0b4c734ee1e812d0ea955710dd8b6f88821016e22972940697e44eb7ef4f795e86eade9f8a07ccc0

                    • C:\Users\Admin\AppData\Local\Temp\RESD637.tmp

                      Filesize

                      1KB

                      MD5

                      2fd9a902b395b9061ca77b4d82986b14

                      SHA1

                      9e638cac2c364477b822cbf8df017c1b25f4d657

                      SHA256

                      d9bae9474c6744af4d48400c526d51901ecf4126ac7461bd3364d52b7ef3c8ee

                      SHA512

                      ea7be5625956e80e158d735a87ba6b38f2bf0c8817548b98b9ab5993309dc543bdaf3117bcb26c28cb85c98baaccbe91e185ab0047275d0147c2024ba3423707

                    • C:\Users\Admin\AppData\Local\Temp\RESD6B4.tmp

                      Filesize

                      1KB

                      MD5

                      3ab497b62aec78851e8d11f23b9e3289

                      SHA1

                      9bcfe42b909fedea8ba5a4b109249d76252ce544

                      SHA256

                      e4c0c0e123f21098aa1e75f08064f944944e6ff048d56d40e6605a91e2cc92c9

                      SHA512

                      5903193bfcd034f70679b1722a2d068424dd402837ab87cc2eb18e05e0c64cfac69123c6fa554f338bc16049224e8bfc651d65d899cb4a00b7fbc26f3903000e

                    • C:\Users\Admin\AppData\Local\Temp\RESD702.tmp

                      Filesize

                      1KB

                      MD5

                      e25fdb0d57d0c799a4686089a01249fe

                      SHA1

                      5e7979d2da024d37c895fc2800f30d4800390abb

                      SHA256

                      69321c7de13e6ab3816be5e23b2b7181fbeaff7373472ac356e636e543263966

                      SHA512

                      c3151761556cbc4eb1bd52d4ba9ab4cfc57622a8daf30ea5885e02ba6a672f9924c0070e146c92315efe0ae77170bd3684e09064b491626a9c8c548c648f3318

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_te2ubdkq.4vt.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\asknxqhl.0.vb

                      Filesize

                      272B

                      MD5

                      2b3aac520562a93ebef6a5905d4765c9

                      SHA1

                      10ab45c5d73934b16fac5e30bf22f17d3e0810c8

                      SHA256

                      b9f0edf067faaaa7da2d47e3d22b957cd302eb25e01e08ea79c664868f328f89

                      SHA512

                      9514934ed12d93ea3ad4e6873cf294bafa114bc7a784a93b14dd2410d07fae3a2c00308035a5c129c57e283de8b94ed36fd9f9de35b08eb79a82a0c732e50446

                    • C:\Users\Admin\AppData\Local\Temp\asknxqhl.cmdline

                      Filesize

                      172B

                      MD5

                      54834594ca7e86226bd2807e078f7eab

                      SHA1

                      5a6d652192569317994846601d9e66bfca8ec6c9

                      SHA256

                      617c140f3148853609a509514add7a02b5c8e68f3bce82f8d67d74ae9c6c06b7

                      SHA512

                      8a73a5f97b92b72f5b0dc5a40c2f4a8dec8a7c125af5e360458de0a7ea6275fa70ccf3634dae4356478e21e510db08c383a6743d10ae9f1eba800baee507a0cd

                    • C:\Users\Admin\AppData\Local\Temp\c5ryho6u.0.vb

                      Filesize

                      270B

                      MD5

                      658573fde2bebc77c740da7ddaa4634b

                      SHA1

                      073da76c50b4033fcfdfb37ba6176afd77b0ea55

                      SHA256

                      c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                      SHA512

                      f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                    • C:\Users\Admin\AppData\Local\Temp\c5ryho6u.cmdline

                      Filesize

                      170B

                      MD5

                      d80b8f3f67ab744f59039d48123ad351

                      SHA1

                      5cfe9581e52b9d45c49ea3a9c483187575768666

                      SHA256

                      0f61f07e160ddcf709176f7482a73481e86b6fea81fa7d5d7fc775ff2c989bfd

                      SHA512

                      682bfca269b7caff890f9c180ed05b687bd59efc2fbcad4491bc23b0171e1ba86fd3c9d4caadc554a77dc1cf6539327325e71a37b742ebd8f83b63537e5f00aa

                    • C:\Users\Admin\AppData\Local\Temp\djuqv6sv.0.vb

                      Filesize

                      256B

                      MD5

                      076803692ac8c38d8ee02672a9d49778

                      SHA1

                      45d2287f33f3358661c3d6a884d2a526fc6a0a46

                      SHA256

                      5b3ab23bcadaeb54a41bdb1636bcaf7772af028d375f42baeb967de6579ef2a3

                      SHA512

                      cc9126384a287ccb99d10d5c2d3034cdbc8a45e94f1cec48dd95f2aa08ebbe3053ffd6d6effa31f2d84164edbb6136398cd02c08b05f027a6a777dffd1daea5d

                    • C:\Users\Admin\AppData\Local\Temp\djuqv6sv.cmdline

                      Filesize

                      156B

                      MD5

                      4f6ef021cb097a718dc5a685f337aa4f

                      SHA1

                      07d9e03540167d68d669e22f11733b9609c23c55

                      SHA256

                      aece079676b6729c05932491a7fdc8e8521ee8291ef93ae89fa2f1eb8583d2d3

                      SHA512

                      c0359d3923ba15bda0e10a0fc14c4b6c83ed4e6100c4aafc81cb9c5684dbf723d181f61eeb294af3c49ccbba625ba5f0b52834e7662a1918d15327a8fab581a7

                    • C:\Users\Admin\AppData\Local\Temp\evn0zgch.0.vb

                      Filesize

                      262B

                      MD5

                      88cc385da858aaa7057b54eaeb0df718

                      SHA1

                      b108224d4686b5ca3faaeb1c728dfba8740a6eca

                      SHA256

                      08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                      SHA512

                      4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                    • C:\Users\Admin\AppData\Local\Temp\evn0zgch.cmdline

                      Filesize

                      162B

                      MD5

                      f74abb1a2b531cbfe9fc5ef9a569b22d

                      SHA1

                      f77f582be8bb75c72c66e540b52295ea955deef0

                      SHA256

                      d4ffe432c2b099ae54becc54420fdabd7a7490920bacf29387961ef989e06166

                      SHA512

                      1bae15bbd6d6ff511a7b9e2047addd8b8106ba0e0d1eccdbad0f18a9d3b5b70f7240edfb1a4c89e1e736642e04bb809e52e174397c45720bd30a0b43a0a85181

                    • C:\Users\Admin\AppData\Local\Temp\gnmxkpd_.0.vb

                      Filesize

                      271B

                      MD5

                      ac972015bef75b540eb33503d6e28cc2

                      SHA1

                      5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                      SHA256

                      fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                      SHA512

                      36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                    • C:\Users\Admin\AppData\Local\Temp\gnmxkpd_.cmdline

                      Filesize

                      171B

                      MD5

                      30110e6c8b0efb1a124d4ef49c5d28fa

                      SHA1

                      1bc83469a146b1f650c71fdfdf16dfc63c7f74e7

                      SHA256

                      d29467b59c49216a9f243af56be7e75ed406358877caa6bdda509fd69666af2e

                      SHA512

                      18b09f1ed1335796ad48a956cd0846d982868e34f0a7ebaeab4c0013eb2446b1fd7e0d90b0989d4be22ace89cf2fcb788d24c401a5094cb7f1b0962877ae4556

                    • C:\Users\Admin\AppData\Local\Temp\ln72_bos.0.vb

                      Filesize

                      274B

                      MD5

                      539683c4ca4ee4dc46b412c5651f20f5

                      SHA1

                      564f25837ce382f1534b088cf2ca1b8c4b078aed

                      SHA256

                      ec2210924d5c1af6377ef4bdf76d6ca773aaa1ae0438b0850f44d8c4e16ef92e

                      SHA512

                      df7c1a55e53f9b9bf23d27762d2d1163c78808e9b4d95e98c84c55ca4ecb7009ed58574ae6ddede31459f300483a1dc42987295a04f6c8702f297d3f1942f4ac

                    • C:\Users\Admin\AppData\Local\Temp\ln72_bos.cmdline

                      Filesize

                      174B

                      MD5

                      26620b24cfcf73766ba7a288243603dd

                      SHA1

                      f8a99181e45b7fef0c357c7cb1797a65b1a1d184

                      SHA256

                      adeaf350861b79be4f708479d8dd12eb078f74f565dae4d525c4b35b4d94cced

                      SHA512

                      aa7882ff9e7457fcfe0e9314a734e902c4a9211dbf0123c1e3f6f141084797f0d0a8b2913d97fe093fee2425297fdf0d90b6ac3bd7d7641c3bd48c5958df376e

                    • C:\Users\Admin\AppData\Local\Temp\qd373hlw.0.vb

                      Filesize

                      271B

                      MD5

                      325f27ef75bebe8b3f80680add1943d3

                      SHA1

                      1c48e211258f8887946afb063e9315b7609b4ee3

                      SHA256

                      034c75813491d628a1a740b45888fc0c301b915456aaa7ba6433b4f1368cda35

                      SHA512

                      e2165b425558872897990953c26e48776f45751a53da035f1ad86ac062ec23a2923b984d84f992de5c0170f6e192feb155ffff25f51bc76ab273b996daacb804

                    • C:\Users\Admin\AppData\Local\Temp\qd373hlw.cmdline

                      Filesize

                      171B

                      MD5

                      9337c562d36f1fd436f8e5b593e275fa

                      SHA1

                      fa12b9ca82dd793daaea338a2d0431772c546bc6

                      SHA256

                      eb0dc49c37381a09435b141094ba1cecb4248b7451fda4f289d3598cf6af2358

                      SHA512

                      1f7ba0e28b53137980446dc47b119097a01628c82cb1af4a0e80130048fcf0e251faeca4adf3c54eb11818e211d688881b93dec27e4bb5600a62532686fae77c

                    • C:\Users\Admin\AppData\Local\Temp\vbc1ED37BA34FAE4059B448EA051D8947E.TMP

                      Filesize

                      676B

                      MD5

                      85c61c03055878407f9433e0cc278eb7

                      SHA1

                      15a60f1519aefb81cb63c5993400dd7d31b1202f

                      SHA256

                      f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b

                      SHA512

                      7099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756

                    • C:\Users\Admin\AppData\Local\Temp\vbc82D708AF53594BA89ACBF386CF349475.TMP

                      Filesize

                      684B

                      MD5

                      7a707b422baa7ca0bc8883cbe68961e7

                      SHA1

                      addf3158670a318c3e8e6fdd6d560244b9e8860e

                      SHA256

                      453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                      SHA512

                      81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                    • C:\Users\Admin\AppData\Local\Temp\vbc93529441DD8D482F8F25F53AE411F0B1.TMP

                      Filesize

                      668B

                      MD5

                      3906bddee0286f09007add3cffcaa5d5

                      SHA1

                      0e7ec4da19db060ab3c90b19070d39699561aae2

                      SHA256

                      0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                      SHA512

                      0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                    • C:\Users\Admin\AppData\Local\Temp\vbcA7E15B34B4B849BD8F9539B0869FD4C7.TMP

                      Filesize

                      644B

                      MD5

                      dac60af34e6b37e2ce48ac2551aee4e7

                      SHA1

                      968c21d77c1f80b3e962d928c35893dbc8f12c09

                      SHA256

                      2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                      SHA512

                      1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                    • C:\Users\Admin\AppData\Local\Temp\vbcDDEADAB6145D4C91A0EE8BF372CCE11B.TMP

                      Filesize

                      684B

                      MD5

                      8135713eeb0cf1521c80ad8f3e7aad22

                      SHA1

                      1628969dc6256816b2ab9b1c0163fcff0971c154

                      SHA256

                      e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a

                      SHA512

                      a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4

                    • C:\Windows\System32\MSSCS.exe

                      Filesize

                      21KB

                      MD5

                      6fe3fb85216045fdf8186429c27458a7

                      SHA1

                      ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                      SHA256

                      905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                      SHA512

                      d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                    • memory/868-22-0x00007FF979E80000-0x00007FF97A821000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/868-19-0x00007FF979E80000-0x00007FF97A821000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/868-18-0x00007FF979E80000-0x00007FF97A821000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2784-6-0x000000001CA40000-0x000000001CADC000-memory.dmp

                      Filesize

                      624KB

                    • memory/2784-3-0x000000001C110000-0x000000001C1B6000-memory.dmp

                      Filesize

                      664KB

                    • memory/2784-4-0x000000001C230000-0x000000001C292000-memory.dmp

                      Filesize

                      392KB

                    • memory/2784-0-0x00007FF97A135000-0x00007FF97A136000-memory.dmp

                      Filesize

                      4KB

                    • memory/2784-5-0x00007FF979E80000-0x00007FF97A821000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2784-21-0x00007FF979E80000-0x00007FF97A821000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2784-9-0x00007FF979E80000-0x00007FF97A821000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2784-1-0x00007FF979E80000-0x00007FF97A821000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2784-2-0x000000001BC40000-0x000000001C10E000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2784-8-0x00007FF979E80000-0x00007FF97A821000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2784-7-0x00007FF97A135000-0x00007FF97A136000-memory.dmp

                      Filesize

                      4KB

                    • memory/3320-31-0x0000019DF5B40000-0x0000019DF5B62000-memory.dmp

                      Filesize

                      136KB