Resubmissions

20/04/2025, 00:10

250420-agcc8axyax 10

16/04/2025, 11:04

250416-m58gsaz1ay 10

15/04/2025, 17:34

250415-v5ylksypw9 10

15/04/2025, 06:16

250415-g1p7ras1dw 10

14/04/2025, 08:06

250414-jzpwpstxhx 10

14/04/2025, 07:59

250414-jvg1assky4 10

14/04/2025, 07:22

250414-h7g1dss1h1 10

14/04/2025, 07:16

250414-h3xv2s1nv6 10

Analysis

  • max time kernel
    293s
  • max time network
    302s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2025, 00:10

General

  • Target

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe

  • Size

    21KB

  • MD5

    6fe3fb85216045fdf8186429c27458a7

  • SHA1

    ef2c68d0b3edf3def5d90f1525fe87c2142e5710

  • SHA256

    905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

  • SHA512

    d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

  • SSDEEP

    384:nPD9On5gIdjbvRPJnMacNj6FIlKrZbJsV5reQ+ys:b9On2nV6FIlKr1

Malware Config

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Drops file in System32 directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\AppData\Local\Temp\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\system32\MSSCS.exe
      "C:\Windows\system32\MSSCS.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -ExecutionPolicy Bypass -Command [System.Reflection.Assembly]::LoadWithPartialName('System.Windows.Forms'); [System.Windows.Forms.MessageBox]::Show('Isto abriu lol','Rekt!',0,64)
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:456
      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nnxapatm.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3204
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE569.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcFBCF773D8D942C28399E147ECF1FD57.TMP"
          4⤵
            PID:3908
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
          "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fawmyjyr.cmdline"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1292
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE625.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7587E6847A2B407799B292FB67261185.TMP"
            4⤵
              PID:4872
          • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
            "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\x0eafjcr.cmdline"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1608
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE6C1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2485AA95EFC343EEB3BA7CED7773FD11.TMP"
              4⤵
                PID:3544
            • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
              "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xlnlw1lu.cmdline"
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2528
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE73E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD0B3D8A96FCB47FAAC45C1A8CF14EF38.TMP"
                4⤵
                  PID:4344
              • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\iryu21vn.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:5008
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE7CB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9EB50FDC1C6C459D9E1D135FD672532.TMP"
                  4⤵
                    PID:4412
                • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\49z7czze.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4448
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE857.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB07D2AD199934437871162EBAA777CF1.TMP"
                    4⤵
                      PID:224
                  • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ccy2bhg9.cmdline"
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4584
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE8D4.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc868FED5C44448CB88E9D2DCDC84F32.TMP"
                      4⤵
                        PID:3460
                    • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\cmxqtrsi.cmdline"
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3028
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE951.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD2F3F1FC3E6B4A22AB4C287386239FC.TMP"
                        4⤵
                          PID:3020
                      • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\2tnrdvc0.cmdline"
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2092
                        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework64\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE9CE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc7E10B08087704F529BC9F94734ACF352.TMP"
                          4⤵
                            PID:3252

                    Network

                    MITRE ATT&CK Enterprise v16

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\2tnrdvc0.0.vb

                      Filesize

                      273B

                      MD5

                      3c3d3136aa9f1b87290839a1d26ad07a

                      SHA1

                      005a23a138be5d7a98bdd4a6cc7fab8bdca962f4

                      SHA256

                      5b745f85a39312bfa585edbd7e3465371578b42fa639eded4cdad8c9f96b87fd

                      SHA512

                      fbb085ffcd77ac96c245067fd96a0c20492d55331161f292975b0c11386424a96534a500133217f84d44455e16139d01230455bce5db3d472271620c29381f60

                    • C:\Users\Admin\AppData\Local\Temp\2tnrdvc0.cmdline

                      Filesize

                      173B

                      MD5

                      1be44163b9486cbce3dca1070b6efc48

                      SHA1

                      572fe3cb9f83802302ce36d714e336b72b7c420c

                      SHA256

                      c395d8e0bd7741c7e1cb7d4c252d3245bad6e23255718b5c3d3e1d1f565f1f5b

                      SHA512

                      a6dafe8a3c33e9d74550acd46cd131e46788d379889008fd43d007b115e797175672a7ff3d7ad3949967e4aa028d579c23c0ba64450854e79df66af9a3e68228

                    • C:\Users\Admin\AppData\Local\Temp\49z7czze.0.vb

                      Filesize

                      274B

                      MD5

                      539683c4ca4ee4dc46b412c5651f20f5

                      SHA1

                      564f25837ce382f1534b088cf2ca1b8c4b078aed

                      SHA256

                      ec2210924d5c1af6377ef4bdf76d6ca773aaa1ae0438b0850f44d8c4e16ef92e

                      SHA512

                      df7c1a55e53f9b9bf23d27762d2d1163c78808e9b4d95e98c84c55ca4ecb7009ed58574ae6ddede31459f300483a1dc42987295a04f6c8702f297d3f1942f4ac

                    • C:\Users\Admin\AppData\Local\Temp\49z7czze.cmdline

                      Filesize

                      174B

                      MD5

                      1a00926f4ce26441609291355c379d8c

                      SHA1

                      97350d873118183078cb1be38f53a6556a698520

                      SHA256

                      73d908ad57fff151cc1e62485ea2b07b8417b354078f64b38fc619b1855a4f92

                      SHA512

                      3de509795489978ca82fb0e3c7a023fecbec4d015c09605876d3c86a447203844bb0555558b1e1ffba193012341c4abe2148cb5af7f85d350eb8d41793f77f7f

                    • C:\Users\Admin\AppData\Local\Temp\RESE569.tmp

                      Filesize

                      1KB

                      MD5

                      4f977ccd487c7984dd1004d3d655e768

                      SHA1

                      5e390c093bb5ad43a28648d66ed5e51907818b80

                      SHA256

                      18299c220c11b21ec51a9043f18353d4916755b6040aad77f6f07b0f38bb4315

                      SHA512

                      b59782ba5b01085f8d0cedd555f83952c256fc13b5362454025664be2c19367b457f92f4d803448a2c0c48dcb7c06c29eb7a555fe1ce65709080a976bac702f5

                    • C:\Users\Admin\AppData\Local\Temp\RESE625.tmp

                      Filesize

                      1KB

                      MD5

                      4a9a6ca6d2d44b1e80c8baa64d42fc56

                      SHA1

                      c4a9866cf0817a7b14291755afb8304edced3f8c

                      SHA256

                      3a7f66a708c027d5ef30de66b9f68e2a784106ecf578c0ef9ef4a24a749dd1ee

                      SHA512

                      d68a392dc411382dac88dd4161d4a60becc326420334e86bade37b597dcf1ace42a6d43a63005b647f86a99d2ab4ea5ef1ede2160aab4e5ecd88492747066283

                    • C:\Users\Admin\AppData\Local\Temp\RESE6C1.tmp

                      Filesize

                      1KB

                      MD5

                      7e12ecb0e4682baa3a321068cdf7c8be

                      SHA1

                      e4b1c9c8a6db48755dddfa3ecb93571753dc60ba

                      SHA256

                      bfcd63617a7e9c99944b86993cfc916e29bbddb16f71c156542652ef04aa7be9

                      SHA512

                      81f0f309a0b7b4f8ced74280fadc1d8a344cab34c39c898f685a797a3536522c021bc8ff081f52d0821818b80506afe72abf10055bfe3e95afe93e9016662bda

                    • C:\Users\Admin\AppData\Local\Temp\RESE73E.tmp

                      Filesize

                      1KB

                      MD5

                      28df8dad2a49ee565be9dff3a4e20381

                      SHA1

                      72f76ff388e4f00621609b2e2a9d0042d9524ad1

                      SHA256

                      9763b20289907be40908a90c92e026a68e1c71be6a3828e59073c6dae2e9a6bb

                      SHA512

                      5051697e7a52470dd5c59984369efc5710fc1392bd5c52377ed6a9c7376c123fd6a4a930616d0b86d0a696cf36630e01ddb8dce04bddd60ecb1d9f3f544401b1

                    • C:\Users\Admin\AppData\Local\Temp\RESE7CB.tmp

                      Filesize

                      1KB

                      MD5

                      da0c6150f0c2c2906d9bc908057b726a

                      SHA1

                      6e4861705dc51a5a9d535620b03f3b2e7d6a230d

                      SHA256

                      9b6292143a4799bb8fe3c5838a8b6289eef5305d526cb8035921d2b847d6a1f9

                      SHA512

                      bc10913f4543586059a30f8711f7db29a67bdec8576b104d2a68b8b65fbfc3a89bfd06fce62392fb9710fb83238c6b351db7363403e38239e3006f6ef8dea40d

                    • C:\Users\Admin\AppData\Local\Temp\RESE857.tmp

                      Filesize

                      1KB

                      MD5

                      c39f75832232eccc0ecc85c793262f0e

                      SHA1

                      860d84caff6ea6f2c5863ecc52092583afcdbcd1

                      SHA256

                      898613dd26760078eadfe9154b34da433762c0c2145a1fdf6f1febc44489b308

                      SHA512

                      67e82ac28d92d62b82cd7c6e3f82fbae2fa5ea37b3bddd49b5587fab44acdb6587043378dc2cbd6a510e755188fd9df04349d12d4f9e768c3baa97c859fdd5fa

                    • C:\Users\Admin\AppData\Local\Temp\RESE8D4.tmp

                      Filesize

                      1KB

                      MD5

                      d104ecdac0a5c0aa37e3a0bf83939d92

                      SHA1

                      48a76276a75f5bf9c39222a20791a8425c99caab

                      SHA256

                      ac454d9a895e5ea15b87041e106abb1e8238294a9bc9ad8d836c6e9a53a38a13

                      SHA512

                      4230f7c21e2dd481bf08f52341267dfdd1355af2f879a28fa453f3ed36ff236e3e1398e11257c08942439825ff50cd979e482ed9b384e03cefc6c04fdf7478e8

                    • C:\Users\Admin\AppData\Local\Temp\RESE951.tmp

                      Filesize

                      1KB

                      MD5

                      527e2a8559e96a199aba43bc5dbedd1c

                      SHA1

                      41736205af8a8de9b7000123fb3387c37e5a481a

                      SHA256

                      0d11ec0500a73f248d3b113f210b16ae0a8217832e09cc041d57cd58d00fc799

                      SHA512

                      9ece953bb6b683a3e26b7df14829b20f15dd2d092e999f43cf54b68081e85437296d2f43f0e80165d32964b89709f8e6c1d774b4ab502bbd52ba026751be5729

                    • C:\Users\Admin\AppData\Local\Temp\RESE9CE.tmp

                      Filesize

                      1KB

                      MD5

                      f38a6318e2035918049a2f4f93f623ca

                      SHA1

                      00665b20fd28d8b5af2950d4d3aa40edd403b9cb

                      SHA256

                      af616290a4ab16938b177645770b76837339a75bd6b7cd6b3dc1e71a27576000

                      SHA512

                      49c09199e103c3a17996c95d29b87e6fbe6e83f48bf88e46687221f7deb3bac932af2be6b1e6bf6b9fc3722b83fef2480f38e179a05a836ee5ccb08204e01612

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4xa2i5fr.ymr.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\ccy2bhg9.0.vb

                      Filesize

                      264B

                      MD5

                      5ce3977a153152978fa71f8aa96909e9

                      SHA1

                      52af143c553c92afc257f0e0d556908eaa8919cb

                      SHA256

                      e07a7bd0c2901d3a349ab55e936b34de2d0abb5f2dc555cc128773b8045d3eed

                      SHA512

                      eaee02ceade0211be70a4710b28fdf043d5c540928e2095ead924a44c2edfca8fc6499395d1b7f5deee96394fb5309362fb87e45ee195094ec39d5fa11909d77

                    • C:\Users\Admin\AppData\Local\Temp\ccy2bhg9.cmdline

                      Filesize

                      164B

                      MD5

                      f630c57a6ab6c5ce6e2fa271ed3ddb80

                      SHA1

                      afb587788803cc52312c3f5c4d8f216a2ce2375f

                      SHA256

                      dc83627b3beec9ed7109d1b267265b2a008dd8280225993a4303720bed239912

                      SHA512

                      47019a8954b7acd1ae03d072709ee672caf168bb1b1a63c6b29505120b51c7234d8c4d3b009ba43cacfff95aa998f1c6bea467d5586bb4ab325183645c92ef9b

                    • C:\Users\Admin\AppData\Local\Temp\cmxqtrsi.0.vb

                      Filesize

                      270B

                      MD5

                      658573fde2bebc77c740da7ddaa4634b

                      SHA1

                      073da76c50b4033fcfdfb37ba6176afd77b0ea55

                      SHA256

                      c07206283d62100d426ba62a81e97bd433966f8b52b5a8dd1451e29a804a1607

                      SHA512

                      f93c7f4378be5eca51161d1541d772a34c07884c9d829608c6fa21563df5691920394afe9da1174ad5c13f773a588b186d1d38a9d375a28562eb58ca4a8b8fbf

                    • C:\Users\Admin\AppData\Local\Temp\cmxqtrsi.cmdline

                      Filesize

                      170B

                      MD5

                      d0ef20581dad65a5be2895249da68e27

                      SHA1

                      af62e95e12e32f225cd1c38cf2f8a39a885b5dee

                      SHA256

                      b94fd5f6d1ea59abc5449b6c4bddf0723d576253b236379b1c01e37786719086

                      SHA512

                      864161f3db533516d2301eaff3dee318c7fb45d1051f2859b074e93a9bb9e8eccac91473ba44245c3858f8bf412ff7315f42cd94ecb06f6dac39bd40ebeb82b9

                    • C:\Users\Admin\AppData\Local\Temp\fawmyjyr.0.vb

                      Filesize

                      262B

                      MD5

                      88cc385da858aaa7057b54eaeb0df718

                      SHA1

                      b108224d4686b5ca3faaeb1c728dfba8740a6eca

                      SHA256

                      08a30db98d970e3b6819d5ecff6eab2211ce93f4cd000c09db96ffb294d05020

                      SHA512

                      4787835240c3e2364172ac2e7649ec8fecb907c7006c38734e59aa65509f360b4596d5db8de20e0c7388a022e1c2f4f9ba75acabba798bea1d40f688539b7df7

                    • C:\Users\Admin\AppData\Local\Temp\fawmyjyr.cmdline

                      Filesize

                      162B

                      MD5

                      9d32ac2ccf2a1306b2b888d61cd69aff

                      SHA1

                      3674455a2fc74a617d634684e6ef0638df9aa5b3

                      SHA256

                      b3f7efb39cf9a718fcc325c85c806ef1173c04d5770930675f980754bce9d92f

                      SHA512

                      1c770b0335c55b708ed6e4b60d01154fe6bbec331dd1e44e2d17eac8c972f06b3622d201cb380b32ca43c991e5bfec38f8cf0109cf3ae264f461ab5cf8af6366

                    • C:\Users\Admin\AppData\Local\Temp\iryu21vn.0.vb

                      Filesize

                      271B

                      MD5

                      325f27ef75bebe8b3f80680add1943d3

                      SHA1

                      1c48e211258f8887946afb063e9315b7609b4ee3

                      SHA256

                      034c75813491d628a1a740b45888fc0c301b915456aaa7ba6433b4f1368cda35

                      SHA512

                      e2165b425558872897990953c26e48776f45751a53da035f1ad86ac062ec23a2923b984d84f992de5c0170f6e192feb155ffff25f51bc76ab273b996daacb804

                    • C:\Users\Admin\AppData\Local\Temp\iryu21vn.cmdline

                      Filesize

                      171B

                      MD5

                      98eca52b31189ae73498053737a236bf

                      SHA1

                      eb6ac31c063e90c1adc1459d48783815f0be9e77

                      SHA256

                      4a81401b56dcd3f4fd92ac4e75a29ff23b3e8ea6d7c1efd623a8369bc6d48d2f

                      SHA512

                      fc765a4a14879ce70408ced22658f2af48ec9dc77db739cd9fe0655ce9d22f0f2b51984a5907bb65c2fb7f0fbf5bd9f763c1135840e41ab88d58466e774e7a62

                    • C:\Users\Admin\AppData\Local\Temp\nnxapatm.0.vb

                      Filesize

                      256B

                      MD5

                      076803692ac8c38d8ee02672a9d49778

                      SHA1

                      45d2287f33f3358661c3d6a884d2a526fc6a0a46

                      SHA256

                      5b3ab23bcadaeb54a41bdb1636bcaf7772af028d375f42baeb967de6579ef2a3

                      SHA512

                      cc9126384a287ccb99d10d5c2d3034cdbc8a45e94f1cec48dd95f2aa08ebbe3053ffd6d6effa31f2d84164edbb6136398cd02c08b05f027a6a777dffd1daea5d

                    • C:\Users\Admin\AppData\Local\Temp\nnxapatm.cmdline

                      Filesize

                      156B

                      MD5

                      6cfc317b1fef78e9967c2f48c21c9150

                      SHA1

                      2317de2c90df84abd587baefc1c55446539eb8ef

                      SHA256

                      eb2eed9f73a0c1f6309f8fa7c606bd8db981a4e4abc04b13a075db1bf9eb2466

                      SHA512

                      a09c450c45872603bfe60d936f72661be12dc9872701403b3ef777d02116d0e90ddc7208116696f4e4a824edd8fecf175af82492cc49a749674ad16280cfce11

                    • C:\Users\Admin\AppData\Local\Temp\vbc7587E6847A2B407799B292FB67261185.TMP

                      Filesize

                      668B

                      MD5

                      3906bddee0286f09007add3cffcaa5d5

                      SHA1

                      0e7ec4da19db060ab3c90b19070d39699561aae2

                      SHA256

                      0deb26dcfb2f74e666344c39bd16544fcaae1a950be704b1fd4e146e77b12c00

                      SHA512

                      0a73de0e70211323d9a8469ec60042a6892426e30ad798a39864ba123c1905d6e22cb8458a446e2f45ec19cf0233fa18d90e5f87ec987b657a35e35a49fea3b0

                    • C:\Users\Admin\AppData\Local\Temp\vbc7E10B08087704F529BC9F94734ACF352.TMP

                      Filesize

                      684B

                      MD5

                      7a707b422baa7ca0bc8883cbe68961e7

                      SHA1

                      addf3158670a318c3e8e6fdd6d560244b9e8860e

                      SHA256

                      453ad1da51152e3512760bbd206304bf48f9c880f63b6a0726009e2d1371c71c

                      SHA512

                      81147c1c4c5859249f4e25d754103f3843416e3d0610ac81ee2ef5e5f50622ea37f0c68eeb7fa404f8a1779dc52af02d2142874e39c212c66fa458e0d62926a9

                    • C:\Users\Admin\AppData\Local\Temp\vbcB07D2AD199934437871162EBAA777CF1.TMP

                      Filesize

                      684B

                      MD5

                      8135713eeb0cf1521c80ad8f3e7aad22

                      SHA1

                      1628969dc6256816b2ab9b1c0163fcff0971c154

                      SHA256

                      e14dd88df69dc98be5bedcbc8c43d1e7260b4492899fec24d964000a3b096c7a

                      SHA512

                      a0b7210095767b437a668a6b0bcedf42268e80b9184b9910ed67d665fba9f714d06c06bff7b3da63846791d606807d13311946505776a1b891b39058cfb41bd4

                    • C:\Users\Admin\AppData\Local\Temp\vbcD0B3D8A96FCB47FAAC45C1A8CF14EF38.TMP

                      Filesize

                      676B

                      MD5

                      85c61c03055878407f9433e0cc278eb7

                      SHA1

                      15a60f1519aefb81cb63c5993400dd7d31b1202f

                      SHA256

                      f0c9936a6fa84969548f9ffb4185b7380ceef7e8b17a3e7520e4acd1e369234b

                      SHA512

                      7099b06ac453208b8d7692882a76baceec3749d5e19abc1287783691a10c739210f6bdc3ee60592de8402ca0b9a864eb6613f77914b76aec1fc35157d0741756

                    • C:\Users\Admin\AppData\Local\Temp\vbcFBCF773D8D942C28399E147ECF1FD57.TMP

                      Filesize

                      644B

                      MD5

                      dac60af34e6b37e2ce48ac2551aee4e7

                      SHA1

                      968c21d77c1f80b3e962d928c35893dbc8f12c09

                      SHA256

                      2edc4ef99552bd0fbc52d0792de6aaa85527621f5c56d0340d9a2963cbc9eed6

                      SHA512

                      1f1badd87be7c366221eaa184ae9b9ae0593a793f37e3c1ce2d4669c83f06de470053550890ad6781b323b201a8b9d45a5e2df5b88e01c460df45278e1228084

                    • C:\Users\Admin\AppData\Local\Temp\x0eafjcr.0.vb

                      Filesize

                      271B

                      MD5

                      ac972015bef75b540eb33503d6e28cc2

                      SHA1

                      5c1d09fcf4c719711532dcfd0544dfc6f2b90260

                      SHA256

                      fa445cc76cde3461a5f1f1281fefcb0c7db69b2685f8a67a06a0f33a067e74e7

                      SHA512

                      36b2e1f7b7a6f2c60788f88d95bfdc53b7d261c203eb637a36fbd07d81bc46edc87e528f1987df73963cb75ca2f19c3a4b3df9ade52d5768ecec23753099cc83

                    • C:\Users\Admin\AppData\Local\Temp\x0eafjcr.cmdline

                      Filesize

                      171B

                      MD5

                      3e8f811576dc7ca68220d114e91cb53b

                      SHA1

                      f57b50cf4f0707fcb12b49e8c76d95ed16ff02f0

                      SHA256

                      18be1f6cad46cf960d66f3b22bf4a7b5642354ee58f4e0cbb1184cd0e0b2cd16

                      SHA512

                      aea8ea1decb945298c74d921c524c01cbadd4b71b1e44fb86aa2a2cbadd0e13b6423d5b7dce58896acada648ee904433d4ce29d75edbee6a3d9d9be1bed07d12

                    • C:\Users\Admin\AppData\Local\Temp\xlnlw1lu.0.vb

                      Filesize

                      272B

                      MD5

                      2b3aac520562a93ebef6a5905d4765c9

                      SHA1

                      10ab45c5d73934b16fac5e30bf22f17d3e0810c8

                      SHA256

                      b9f0edf067faaaa7da2d47e3d22b957cd302eb25e01e08ea79c664868f328f89

                      SHA512

                      9514934ed12d93ea3ad4e6873cf294bafa114bc7a784a93b14dd2410d07fae3a2c00308035a5c129c57e283de8b94ed36fd9f9de35b08eb79a82a0c732e50446

                    • C:\Users\Admin\AppData\Local\Temp\xlnlw1lu.cmdline

                      Filesize

                      172B

                      MD5

                      79f46e51ba82519821815d0136f0902f

                      SHA1

                      cc3a53748c3e2c47887bee45ec6f943a1a58337e

                      SHA256

                      bedec8040dc9831e0ac77f53dc3c0f99bad52d5024d04914a174c3e7112486db

                      SHA512

                      b2d790a67d0f369c4aae0a9adaa9ec356f13e7f20a93695f98347f69f5cdf1179286e4de7086ee2611e29117892472999edd07f96b8a1b50b6173d9f10d4ba5b

                    • C:\Windows\System32\MSSCS.exe

                      Filesize

                      21KB

                      MD5

                      6fe3fb85216045fdf8186429c27458a7

                      SHA1

                      ef2c68d0b3edf3def5d90f1525fe87c2142e5710

                      SHA256

                      905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550

                      SHA512

                      d2180f2d7ca35362a2dc322801fb0eee22820f2ac317c0be4c788c31d3939d30c9b356bf8daf0746545fb66092471f46f5d47c40403ed68b09415fcca90a125c

                    • memory/432-22-0x00007FFED5FE0000-0x00007FFED6981000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/432-20-0x00007FFED5FE0000-0x00007FFED6981000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/432-19-0x00007FFED5FE0000-0x00007FFED6981000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/456-31-0x000002A993D70000-0x000002A993D92000-memory.dmp

                      Filesize

                      136KB

                    • memory/2236-6-0x000000001C940000-0x000000001C9DC000-memory.dmp

                      Filesize

                      624KB

                    • memory/2236-3-0x000000001BAB0000-0x000000001BF7E000-memory.dmp

                      Filesize

                      4.8MB

                    • memory/2236-4-0x000000001C030000-0x000000001C0D6000-memory.dmp

                      Filesize

                      664KB

                    • memory/2236-0-0x00007FFED6295000-0x00007FFED6296000-memory.dmp

                      Filesize

                      4KB

                    • memory/2236-5-0x000000001C210000-0x000000001C272000-memory.dmp

                      Filesize

                      392KB

                    • memory/2236-21-0x00007FFED5FE0000-0x00007FFED6981000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2236-9-0x00007FFED5FE0000-0x00007FFED6981000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2236-2-0x00007FFED5FE0000-0x00007FFED6981000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2236-1-0x00007FFED5FE0000-0x00007FFED6981000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2236-8-0x00007FFED5FE0000-0x00007FFED6981000-memory.dmp

                      Filesize

                      9.6MB

                    • memory/2236-7-0x00007FFED6295000-0x00007FFED6296000-memory.dmp

                      Filesize

                      4KB