Resubmissions

16/04/2025, 11:04

250416-m58gsaz1ay 10

15/04/2025, 17:34

250415-v5ylksypw9 10

15/04/2025, 06:16

250415-g1p7ras1dw 10

14/04/2025, 08:06

250414-jzpwpstxhx 10

14/04/2025, 07:59

250414-jvg1assky4 10

14/04/2025, 07:22

250414-h7g1dss1h1 10

14/04/2025, 07:16

250414-h3xv2s1nv6 10

Analysis

  • max time kernel
    273s
  • max time network
    278s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2025, 11:04

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1428
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\takjkbu-.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3412
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD71.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2C819A4F53E541BE9D8B0564580D61F.TMP"
          4⤵
            PID:2808
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ml8gawao.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4300
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAE1D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9A7894BF79424AE1ACD9E66674453AE.TMP"
            4⤵
              PID:3644
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bprv3qh4.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:6096
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAEAA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1DFEF55347284337B157F9C054A6258B.TMP"
              4⤵
                PID:5548
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\j9iiaz8p.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:5148
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAF56.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc836CCF4174B45F0AEDA2CD53F129D90.TMP"
                4⤵
                  PID:2336
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\pfdtoifn.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1604
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAFD3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC0EB424B12434BE7AEDF4E871D34A5B.TMP"
                  4⤵
                    PID:2312
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dp_wqnln.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1004
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB030.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF064D731D76C4CAF9DABE266A1BCA980.TMP"
                    4⤵
                      PID:3616
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vih7hzs7.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1976
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB09E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6C915DA670774944A2CBD42E9C304269.TMP"
                      4⤵
                        PID:5544
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yyga4l8q.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3316
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB0FC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1212C781EDBA45879449B1E05D9517A6.TMP"
                        4⤵
                          PID:4224
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2lxocqpn.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:5272
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB159.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF546018773B24ADE92F62A82F8D1E9D1.TMP"
                          4⤵
                            PID:1028

                    Network

                    MITRE ATT&CK Enterprise v16

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\2lxocqpn.0.vb

                      Filesize

                      273B

                      MD5

                      3c3d3136aa9f1b87290839a1d26ad07a

                      SHA1

                      005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                      SHA256

                      5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                      SHA512

                      fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                    • C:\Users\Admin\AppData\Local\Temp\2lxocqpn.cmdline

                      Filesize

                      173B

                      MD5

                      8efe7a92e6578ad25bce6255226caf06

                      SHA1

                      8e21e1813facdaa62b593204aba92bd6ddf505ec

                      SHA256

                      c8f4c992c8451d5d5a0a8471bb59d91d047ef8b072c74fbba2d147615840ecad

                      SHA512

                      debdc76f7e5a33532000151052d1105998983e12f46b35c8a661c208eae54b573e06d4e3022506c695a42174c701e47323057797680d0a731ec5fed9f84b5137

                    • C:\Users\Admin\AppData\Local\Temp\RESAD71.tmp

                      Filesize

                      1KB

                      MD5

                      64173c21e8eb44ba9802f0ab9c7a33a8

                      SHA1

                      4478d1826ab0fa11bd2319bcf12ddd516151bd2d

                      SHA256

                      235a251205005282a22bc4e1a409f9056061b158d37607bad7c7558855e5cd5a

                      SHA512

                      0f6fc0137140bc661cc1cac97897148fa513fe0a5c095fa0c8ee82c1e4331c359ea7363e72057ed3f88862f85c7aae391adf6be54ccf963efddb1a359acf2220

                    • C:\Users\Admin\AppData\Local\Temp\RESAE1D.tmp

                      Filesize

                      1KB

                      MD5

                      fc098385f434824d9498a63d3a13f98c

                      SHA1

                      8fd595ac6158f449a4094e873709af902d1729c8

                      SHA256

                      92f2b1334b090e99a7f5f7796b3a4032e80d0be2d22cdef18bf28d9f2b872a2a

                      SHA512

                      94d17871cc6c246c95321508682ab8b0dd2ff8a0932e2b58f4f5e9df946e8ce5c03d30f9828c1fef4c927c0428c558ad3bc3c7859063911296ce181a5d01d0f3

                    • C:\Users\Admin\AppData\Local\Temp\RESAEAA.tmp

                      Filesize

                      1KB

                      MD5

                      668c37f7ea45740b9518a89c65ff9d2b

                      SHA1

                      590c717d753bd87b77dd8c7f613e77a1b07a4d8b

                      SHA256

                      76b44ad38b785922d5c1d42aa336288e8cd48ad186750ec64dc925a85f2bc0ac

                      SHA512

                      473fca26f04240e3d986ebda71892d7d3369b8b94ab178e0d788992754db37433c4d491a7e366ebf4b2568b94ed7a59a2e783fa4d699f6527dea80b2041238ad

                    • C:\Users\Admin\AppData\Local\Temp\RESAF56.tmp

                      Filesize

                      1KB

                      MD5

                      9057045a22c155411d0f9759d69d9f59

                      SHA1

                      bab12331d21a5914f0d4d5fa2180da8c34131112

                      SHA256

                      feb023910bc76471691198cfb51bf650be045a7607f3b58b379b997d05102b53

                      SHA512

                      db9d85ee32b022a7a12a7ba8b65575d8427ed17f67a3b4624349e399e13589c66af2a7399958125a52f9d39e793eb043db3c4593fef13a53693612f41b34090a

                    • C:\Users\Admin\AppData\Local\Temp\RESAFD3.tmp

                      Filesize

                      1KB

                      MD5

                      966a0cd9a6e19a38fa1524ef9a4501bc

                      SHA1

                      c5cce0cfc133022e68283fae7c5ebb6d74c600cb

                      SHA256

                      f39c514d484164b07f79333828a32b57e69545b570e2694f1631dd614471c180

                      SHA512

                      87707c359e5f0a41e9764929ed9f48a26eaca5d39af380807cccf7d22618f83d67f6bc347b6ef949a0a94ff565e6b8322385ded65a4d9af3f0068250d3c9179a

                    • C:\Users\Admin\AppData\Local\Temp\RESB030.tmp

                      Filesize

                      1KB

                      MD5

                      8ac6737e5bd7a63714a8c32e889395c2

                      SHA1

                      b23ff302c888392a15c72766a3939d5e2a8bb04b

                      SHA256

                      aa00e81d3b71ca8c1bfec01c4791b3f6ac32e28c02b3b430ff678762f32a9652

                      SHA512

                      46e3cd2e891ed041f32f1be4e55b836c2f13e75be40a52c9d0b9522f2183e5af323da04a0f5268705d6a7fcf0c118a6ad3d449abe7bbc8618529a4d8590232b6

                    • C:\Users\Admin\AppData\Local\Temp\RESB09E.tmp

                      Filesize

                      1KB

                      MD5

                      1b7f572986c270c7bb4ceba3b5810f75

                      SHA1

                      5f8230d121883516fdf179ca0cdde85c8f6eccd2

                      SHA256

                      a2c0a6eec19ef3c8e22bb502fd9df5dcc306ba967eda4ffe694b154859b20083

                      SHA512

                      061d303d58093e68f229c87fd9d0211a2bce3a7f2d280771ef67ba613c93ed211851bb77259d1bc0e80ed21006687057a67e16cd9ff363d5574483b2b815c40c

                    • C:\Users\Admin\AppData\Local\Temp\RESB0FC.tmp

                      Filesize

                      1KB

                      MD5

                      184b63dd154cc35e0f3a529f7003af24

                      SHA1

                      fc422487307017ba08a130ff6d26fcdcc32dc423

                      SHA256

                      d6a00b929e68d2fb7aabab078a3de3eb8b06eabddfb72f7d57b13835df04d1dd

                      SHA512

                      32b92d51944517d3fa7188108ecb9d1030e498b25d84866db6cc867d5e047de0a89d25e4cf1a4c97b14c0a65ad83bd192414d5fb713511c042c8c40c1693a98f

                    • C:\Users\Admin\AppData\Local\Temp\RESB159.tmp

                      Filesize

                      1KB

                      MD5

                      57c6e86d1c84b14f75315abeaf68df4e

                      SHA1

                      18e34a497dfca1e1d25b058199fb325ec52acd28

                      SHA256

                      96d104cb23285ef77f23b652015242cbad87a1664c0611db8bff00adae0d7086

                      SHA512

                      c86288ba46b663f5ff6c6aca73abedbec367ea4bd42e1482aa2860d15f90203c1ff1a16c691ec685a50a1a468f3f591a2cf8c0259fc65002663a0928e906a11a

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1myyj3ci.1gv.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\bprv3qh4.0.vb

                      Filesize

                      271B

                      MD5

                      ac972015bef75b540eb33503d6e28cc2

                      SHA1

                      5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                      SHA256

                      fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                      SHA512

                      36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                    • C:\Users\Admin\AppData\Local\Temp\bprv3qh4.cmdline

                      Filesize

                      171B

                      MD5

                      881dcf1089b1b0e88e2ffb6657133ddb

                      SHA1

                      29d01dd0ee23914658137e128ce658bd0aeb24b6

                      SHA256

                      cf783533181825c8b1a84c74e8811cdb0ef4274e2fd7e145da68606af88fd35a

                      SHA512

                      93ffe5a0da6edf85cfe11cc66666dbec6b4181322343cc5c5f35de4ef348cd4a17743bb4cc58b8310e2a0e2be2c90942393907857ca8d1c181f05c3762439443

                    • C:\Users\Admin\AppData\Local\Temp\dp_wqnln.0.vb

                      Filesize

                      274B

                      MD5

                      539683c4ca4ee4dc46b412c5651f20f5

                      SHA1

                      564f25837ce382f1534b088cf2ca1b8c4b078aed

                      SHA256

                      ec2210924d5c1af6377ef4bdf76d6ca773aaa1ae0438b0850f44d8c4e16ef92e

                      SHA512

                      df7c1a55e53f9b9bf23d27762d2d1163c78808e9b4d95e98c84c55ca4ecb7009ed58574ae6ddede31459f300483a1dc42987295a04f6c8702f297d3f1942f4ac

                    • C:\Users\Admin\AppData\Local\Temp\dp_wqnln.cmdline

                      Filesize

                      174B

                      MD5

                      66eb26b16461ce866a205f82ca97b168

                      SHA1

                      6de4966ef565ed38130b3fa64039fa5b8905aac0

                      SHA256

                      f20e7e9d63fefbff4954bffdebfd97d24e3869455601dcaf99f186e031f690c9

                      SHA512

                      0bde04ffe5ef4f917a4a71a5c9d19370b9f8d32559898bebb4ea9e32a524138c6a8abf207c30d6cecd2ab52a247e9056f46180ab005172fd4d6b5b2250eeffa2

                    • C:\Users\Admin\AppData\Local\Temp\j9iiaz8p.0.vb

                      Filesize

                      272B

                      MD5

                      2b3aac520562a93ebef6a5905d4765c9

                      SHA1

                      10ab45c5d73934b16fac5e30bf22f17d3e0810c8

                      SHA256

                      b9f0edf067faaaa7da2d47e3d22b957cd302eb25e01e08ea79c664868f328f89

                      SHA512

                      9514934ed12d93ea3ad4e6873cf294bafa114bc7a784a93b14dd2410d07fae3a2c00308035a5c129c57e283de8b94ed36fd9f9de35b08eb79a82a0c732e50446

                    • C:\Users\Admin\AppData\Local\Temp\j9iiaz8p.cmdline

                      Filesize

                      172B

                      MD5

                      a7020c7cc54a7c0a1c4bfa4a743a21f5

                      SHA1

                      249c5923934e0742dca63b90676aba0f08556a94

                      SHA256

                      be27d87b092811eab603b1440c2693093279bb4154fc2456082c69ae71759504

                      SHA512

                      cd9e1b2bf15a530dbe821566f50b1132d675361df1c8acb854d61976879cef760c367ce8b109afed4104e52ca5b47b7666148cbe796f3c206bf977db7f36d059

                    • C:\Users\Admin\AppData\Local\Temp\ml8gawao.0.vb

                      Filesize

                      262B

                      MD5

                      88cc385da858aaa7057b54eaeb0df718

                      SHA1

                      b108224d4686b5ca3faaeb1c728dfba8740a6eca

                      SHA256

                      08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                      SHA512

                      4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                    • C:\Users\Admin\AppData\Local\Temp\ml8gawao.cmdline

                      Filesize

                      162B

                      MD5

                      8d975d1386ccdc5147f7835e8ff656f0

                      SHA1

                      ce20653fea939be85bf596c634dbc7cf85e175b7

                      SHA256

                      47294464f3c90cf1787da3d1bf62692a51534a5d188cf4803b502b5a09f4203d

                      SHA512

                      e4eb1fb9b0d4aebf0c8386c7efee7e69ea3cf7ce20e1e67d41658421d206a92d5d6540d0bde02390f1db862fa80b47e5f2e7c8abfeff1ac1a39e7e0b7a4479f4

                    • C:\Users\Admin\AppData\Local\Temp\pfdtoifn.0.vb

                      Filesize

                      271B

                      MD5

                      325f27ef75bebe8b3f80680add1943d3

                      SHA1

                      1c48e211258f8887946afb063e9315b7609b4ee3

                      SHA256

                      034c75813491d628a1a740b45888fc0c301b915456aaa7ba6433b4f1368cda35

                      SHA512

                      e2165b425558872897990953c26e48776f45751a53da035f1ad86ac062ec23a2923b984d84f992de5c0170f6e192feb155ffff25f51bc76ab273b996daacb804

                    • C:\Users\Admin\AppData\Local\Temp\pfdtoifn.cmdline

                      Filesize

                      171B

                      MD5

                      189329c133080235b74bd306d1d85173

                      SHA1

                      d0a31ced04c978cca9b39e5cf8b9ffc5348695f2

                      SHA256

                      846bfe1fadb9165c8d21f76284ef1f05a0ffa62b328f1dda530f0e8f7bce507b

                      SHA512

                      303f570b2d29decca0cd3e453885b7aca3dc166931885fee1a9263b98e43ec86e2b5d14e05c2bfca050b8b703c234a360d0409564b4998279dce6ec555165929

                    • C:\Users\Admin\AppData\Local\Temp\takjkbu-.0.vb

                      Filesize

                      256B

                      MD5

                      076803692ac8c38d8ee02672a9d49778

                      SHA1

                      45d2287f33f3358661c3d6a884d2a526fc6a0a46

                      SHA256

                      5b3ab23bcadaeb54a41bdb1636bcaf7772af028d375f42baeb967de6579ef2a3

                      SHA512

                      cc9126384a287ccb99d10d5c2d3034cdbc8a45e94f1cec48dd95f2aa08ebbe3053ffd6d6effa31f2d84164edbb6136398cd02c08b05f027a6a777dffd1daea5d

                    • C:\Users\Admin\AppData\Local\Temp\takjkbu-.cmdline

                      Filesize

                      156B

                      MD5

                      08a4a79a2efc79b532fc4eb81697fda1

                      SHA1

                      2c1e85b11514f7140799a848c65d66e50b2166d7

                      SHA256

                      8f104529c85821a43c5fddcf34f57b86e684fb827ce4ece5e345ad74981ba0f3

                      SHA512

                      30eccddeaeb35be1673b65ffbccba5415743dcbfa31789b9f9b51d0a4516c03dadbeceaf2c58427266c7d5da6d422e8023c1b0d0936177bbf4337764ef0f4c4b

                    • C:\Users\Admin\AppData\Local\Temp\vbc2C819A4F53E541BE9D8B0564580D61F.TMP

                      Filesize

                      644B

                      MD5

                      dac60af34e6b37e2ce48ac2551aee4e7

                      SHA1

                      968c21d77c1f80b3e962d928c35893dbc8f12c09

                      SHA256

                      2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                      SHA512

                      1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                    • C:\Users\Admin\AppData\Local\Temp\vbc836CCF4174B45F0AEDA2CD53F129D90.TMP

                      Filesize

                      676B

                      MD5

                      85c61c03055878407f9433e0cc278eb7

                      SHA1

                      15a60f1519aefb81cb63c5993400dd7d31b1202f

                      SHA256

                      f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b

                      SHA512

                      7099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756

                    • C:\Users\Admin\AppData\Local\Temp\vbc9A7894BF79424AE1ACD9E66674453AE.TMP

                      Filesize

                      668B

                      MD5

                      3906bddee0286f09007add3cffcaa5d5

                      SHA1

                      0e7ec4da19db060ab3c90b19070d39699561aae2

                      SHA256

                      0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                      SHA512

                      0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                    • C:\Users\Admin\AppData\Local\Temp\vbcF064D731D76C4CAF9DABE266A1BCA980.TMP

                      Filesize

                      684B

                      MD5

                      8135713eeb0cf1521c80ad8f3e7aad22

                      SHA1

                      1628969dc6256816b2ab9b1c0163fcff0971c154

                      SHA256

                      e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a

                      SHA512

                      a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4

                    • C:\Users\Admin\AppData\Local\Temp\vbcF546018773B24ADE92F62A82F8D1E9D1.TMP

                      Filesize

                      684B

                      MD5

                      7a707b422baa7ca0bc8883cbe68961e7

                      SHA1

                      addf3158670a318c3e8e6fdd6d560244b9e8860e

                      SHA256

                      453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                      SHA512

                      81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                    • C:\Users\Admin\AppData\Local\Temp\vih7hzs7.0.vb

                      Filesize

                      264B

                      MD5

                      5ce3977a153152978fa71f8aa96909e9

                      SHA1

                      52af143c553c92afc257f0e0d556908eaa8919cb

                      SHA256

                      e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                      SHA512

                      eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                    • C:\Users\Admin\AppData\Local\Temp\vih7hzs7.cmdline

                      Filesize

                      164B

                      MD5

                      1861f4446873b041f5dc22783189b516

                      SHA1

                      44edfbae097beadcdec396ea53cf7911e8d1098b

                      SHA256

                      bc0436d590b844923d79b89c8852e5d05ea08d45b5760285c6371501dac48129

                      SHA512

                      d50ff4e7474c9137475125e28885ae3b8e54f9a8e57eec8f08b41b76d2809b6ee18096049e7095d7e285e502ebdb85c0efa42c221c3eb236c2fb993111ca31f8

                    • C:\Users\Admin\AppData\Local\Temp\yyga4l8q.0.vb

                      Filesize

                      270B

                      MD5

                      658573fde2bebc77c740da7ddaa4634b

                      SHA1

                      073da76c50b4033fcfdfb37ba6176afd77b0ea55

                      SHA256

                      c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                      SHA512

                      f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                    • C:\Users\Admin\AppData\Local\Temp\yyga4l8q.cmdline

                      Filesize

                      170B

                      MD5

                      c113b91f325ae35320cb6c9542d90d58

                      SHA1

                      f9d8ac8fb43ed63098bd31e0337c5d6841f74300

                      SHA256

                      c36da93a4ca647157d72ee21ee83ff348b310ad10847861cf259a799fe27481d

                      SHA512

                      b366055e422f496a4ef0d0406af397c0c5af8f7e9ed5878ef82dfdfccd42bd7f72702cf1c7697fbca081a79097a9375d5ebd83bc467dc7fc94a39db229db7044

                    • C:\Windows\System32\MSSCS.exe

                      Filesize

                      21KB

                      MD5

                      6fe3fb85216045fdf8186429c27458a7

                      SHA1

                      ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                      SHA256

                      905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                      SHA512

                      d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                    • memory/1428-40-0x0000021349020000-0x0000021349042000-memory.dmp

                      Filesize

                      136KB

                    • memory/2192-18-0x00007FFD57420000-0x00007FFD57DC1000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2192-22-0x00007FFD57420000-0x00007FFD57DC1000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2192-21-0x00007FFD57420000-0x00007FFD57DC1000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2992-8-0x00007FFD57420000-0x00007FFD57DC1000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2992-6-0x000000001C250000-0x000000001C2EC000-memory.dmp

                      Filesize

                      624KB

                    • memory/2992-20-0x00007FFD57420000-0x00007FFD57DC1000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2992-5-0x00007FFD57420000-0x00007FFD57DC1000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2992-0-0x00007FFD576D5000-0x00007FFD576D6000-memory.dmp

                      Filesize

                      4KB

                    • memory/2992-7-0x00007FFD576D5000-0x00007FFD576D6000-memory.dmp

                      Filesize

                      4KB

                    • memory/2992-4-0x000000001BAE0000-0x000000001BB42000-memory.dmp

                      Filesize

                      392KB

                    • memory/2992-2-0x000000001B000000-0x000000001B0A6000-memory.dmp

                      Filesize

                      664KB

                    • memory/2992-3-0x00007FFD57420000-0x00007FFD57DC1000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2992-9-0x00007FFD57420000-0x00007FFD57DC1000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2992-1-0x000000001B5A0000-0x000000001BA6E000-memory.dmp

                      Filesize

                      4.8MB