Analysis

  • max time kernel
    162s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    11-05-2022 02:29

General

  • Target

    aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe

  • Size

    4.3MB

  • MD5

    34fd6dbb11b1cbf0d235612d6747678e

  • SHA1

    517cf5249f6245075e1d911a3b539114beb50f71

  • SHA256

    aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995

  • SHA512

    6e5f0a914f43cf32445e70e01bae4840b2ccb17424b99be83dea39b1649951b2e7854de63d68f6ad16b9668d8e83b0d5f8f05d1769b3327349aa8b18c0dc3918

Malware Config

Extracted

Family

revengerat

Botnet

NyanCatRevenge

C2

185.81.157.41:5055

Mutex

73845dcfccd2

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Executes dropped EXE 4 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe
    "C:\Users\Admin\AppData\Local\Temp\aff15f407cb77bbe07961830f4e94f8dab637ee9f02aaba76c2e4941f0d43995.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\System32\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /TN Exec /tr C:\Users\Admin\AppData\Local\Temp\Exec.exe
      2⤵
      • Creates scheduled task(s)
      PID:2840
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS1
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\avpb20mv\avpb20mv.cmdline"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3576
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7E77.tmp" "c:\Users\Admin\AppData\Local\Temp\avpb20mv\CSCE9AA76D3E50F4977BF21C2C453D50DB.TMP"
          4⤵
            PID:2752
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:1776
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
              PID:4272
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
              3⤵
                PID:4068
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\CLP.PS1
              2⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4640
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cwmgaok5\cwmgaok5.cmdline"
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:3836
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7ED5.tmp" "c:\Users\Admin\AppData\Local\Temp\cwmgaok5\CSC4D20C0CEE8F24DDDB91FB4221652CB.TMP"
                  4⤵
                    PID:1072
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  3⤵
                  • Suspicious behavior: AddClipboardFormatListener
                  PID:1620
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users" -Force
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4292
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users" -Force
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3572
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate" -Force
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1804
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate" -Force
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4800
              • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\iAmazon.exe
                "C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\iAmazon.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:212
            • C:\Users\Admin\AppData\Local\Temp\Exec.exe
              C:\Users\Admin\AppData\Local\Temp\Exec.exe
              1⤵
              • Executes dropped EXE
              • Checks computer location settings
              • Suspicious use of WriteProcessMemory
              PID:448
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS1
                2⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4712
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\dw013elt\dw013elt.cmdline"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3280
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESABEF.tmp" "c:\Users\Admin\AppData\Local\Temp\dw013elt\CSCDD559C3E30F942A687AC3718BB3E5F29.TMP"
                    4⤵
                      PID:4840
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    3⤵
                      PID:1976
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      3⤵
                        PID:3696
                  • C:\Users\Admin\AppData\Local\Temp\Exec.exe
                    C:\Users\Admin\AppData\Local\Temp\Exec.exe
                    1⤵
                    • Executes dropped EXE
                    • Checks computer location settings
                    PID:1440
                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS1
                      2⤵
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:960
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\uv3h5eo0\uv3h5eo0.cmdline"
                        3⤵
                          PID:5012
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAC39.tmp" "c:\Users\Admin\AppData\Local\Temp\uv3h5eo0\CSC3FCA6E9EAA434564BAA4D01A7C1ACDD.TMP"
                            4⤵
                              PID:4688
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                            3⤵
                              PID:3368
                        • C:\Users\Admin\AppData\Local\Temp\Exec.exe
                          C:\Users\Admin\AppData\Local\Temp\Exec.exe
                          1⤵
                          • Executes dropped EXE
                          • Checks computer location settings
                          PID:4652
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -ExecutionPolicy Bypass -windowstyle hidden -File C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS1
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4856
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ntv1ifhp\ntv1ifhp.cmdline"
                              3⤵
                                PID:2556
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7BED.tmp" "c:\Users\Admin\AppData\Local\Temp\ntv1ifhp\CSC466604F11B1041169B1F210ECCD6161.TMP"
                                  4⤵
                                    PID:1764

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Execution

                            Scheduled Task

                            1
                            T1053

                            Persistence

                            Scheduled Task

                            1
                            T1053

                            Privilege Escalation

                            Scheduled Task

                            1
                            T1053

                            Discovery

                            Query Registry

                            1
                            T1012

                            System Information Discovery

                            2
                            T1082

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Exec.exe.log
                              Filesize

                              654B

                              MD5

                              2ff39f6c7249774be85fd60a8f9a245e

                              SHA1

                              684ff36b31aedc1e587c8496c02722c6698c1c4e

                              SHA256

                              e1b91642d85d98124a6a31f710e137ab7fd90dec30e74a05ab7fcf3b7887dced

                              SHA512

                              1d7e8b92ef4afd463d62cfa7e8b9d1799db5bf2a263d3cd7840df2e0a1323d24eb595b5f8eb615c6cb15f9e3a7b4fc99f8dd6a3d34479222e966ec708998aed1

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
                              Filesize

                              2KB

                              MD5

                              d85ba6ff808d9e5444a4b369f5bc2730

                              SHA1

                              31aa9d96590fff6981b315e0b391b575e4c0804a

                              SHA256

                              84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                              SHA512

                              8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.log
                              Filesize

                              321B

                              MD5

                              08027eeee0542c93662aef98d70095e4

                              SHA1

                              42402c02bf4763fcd6fb0650fc13386f2eae8f9b

                              SHA256

                              1b9ec007ac8e7de37c61313c5e1b9444df6dc0cd9110553bfa281b13204a646d

                              SHA512

                              c4e7a17a1dc1f27c91791439d92435a5d750a065508e9539c9af458f21472a7ce45ba0666ef6855a00386e1a75c518d0908b82d929084a1b67ca4c65997a5979

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                              MD5

                              d41d8cd98f00b204e9800998ecf8427e

                              SHA1

                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                              SHA256

                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                              SHA512

                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                              Filesize

                              53KB

                              MD5

                              a26df49623eff12a70a93f649776dab7

                              SHA1

                              efb53bd0df3ac34bd119adf8788127ad57e53803

                              SHA256

                              4ebde1c12625cb55034d47e5169f709b0bd02a8caa76b5b9854efad7f4710245

                              SHA512

                              e5f9b8645fb2a50763fcbffe877ca03e9cadf099fe2d510b74bfa9ff18d0a6563d11160e00f495eeefebde63450d0ade8d6b6a824e68bd8a59e1971dc842709c

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                              Filesize

                              64B

                              MD5

                              50a8221b93fbd2628ac460dd408a9fc1

                              SHA1

                              7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

                              SHA256

                              46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

                              SHA512

                              27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                              Filesize

                              944B

                              MD5

                              96ff1ee586a153b4e7ce8661cabc0442

                              SHA1

                              140d4ff1840cb40601489f3826954386af612136

                              SHA256

                              0673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8

                              SHA512

                              3404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569

                            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                              Filesize

                              944B

                              MD5

                              96ff1ee586a153b4e7ce8661cabc0442

                              SHA1

                              140d4ff1840cb40601489f3826954386af612136

                              SHA256

                              0673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8

                              SHA512

                              3404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569

                            • C:\Users\Admin\AppData\Local\Temp\Exec.exe
                              Filesize

                              4KB

                              MD5

                              3cfa7f939c72e8e1d69011e9609ee54b

                              SHA1

                              eb7af8d25ae63b348c0b665e0d6f2455420fa576

                              SHA256

                              ed00fbb5f5ca89cd4e81584a6604b689c65f6b16c7f69627a18abac73e70a14f

                              SHA512

                              8591fc11d697a3eb6d07fdfd0d40e353d25a049480606e0653cf3a036ede5f5229d69f3bde30b5dfec6d193b5d7d4df33f4e08e678d46b23eae1c95ceef3f0e7

                            • C:\Users\Admin\AppData\Local\Temp\Exec.exe
                              Filesize

                              4KB

                              MD5

                              3cfa7f939c72e8e1d69011e9609ee54b

                              SHA1

                              eb7af8d25ae63b348c0b665e0d6f2455420fa576

                              SHA256

                              ed00fbb5f5ca89cd4e81584a6604b689c65f6b16c7f69627a18abac73e70a14f

                              SHA512

                              8591fc11d697a3eb6d07fdfd0d40e353d25a049480606e0653cf3a036ede5f5229d69f3bde30b5dfec6d193b5d7d4df33f4e08e678d46b23eae1c95ceef3f0e7

                            • C:\Users\Admin\AppData\Local\Temp\Exec.exe
                              Filesize

                              4KB

                              MD5

                              3cfa7f939c72e8e1d69011e9609ee54b

                              SHA1

                              eb7af8d25ae63b348c0b665e0d6f2455420fa576

                              SHA256

                              ed00fbb5f5ca89cd4e81584a6604b689c65f6b16c7f69627a18abac73e70a14f

                              SHA512

                              8591fc11d697a3eb6d07fdfd0d40e353d25a049480606e0653cf3a036ede5f5229d69f3bde30b5dfec6d193b5d7d4df33f4e08e678d46b23eae1c95ceef3f0e7

                            • C:\Users\Admin\AppData\Local\Temp\Exec.exe
                              Filesize

                              4KB

                              MD5

                              3cfa7f939c72e8e1d69011e9609ee54b

                              SHA1

                              eb7af8d25ae63b348c0b665e0d6f2455420fa576

                              SHA256

                              ed00fbb5f5ca89cd4e81584a6604b689c65f6b16c7f69627a18abac73e70a14f

                              SHA512

                              8591fc11d697a3eb6d07fdfd0d40e353d25a049480606e0653cf3a036ede5f5229d69f3bde30b5dfec6d193b5d7d4df33f4e08e678d46b23eae1c95ceef3f0e7

                            • C:\Users\Admin\AppData\Local\Temp\RES7E77.tmp
                              Filesize

                              1KB

                              MD5

                              b46fc0314b737ff63680f7c00e389a76

                              SHA1

                              a266e78f2d62f5fc100c1fed4e347a097a672ea5

                              SHA256

                              b43ddc0e641ab58168fab6f47bc5226b962a3cdaf8fd9a5952a3c28cd6ba5a97

                              SHA512

                              0a90e3a2bc70fb3067d7bde771d89f6f037cc074c9f9aa923051966619702f699ad4d367ae32597f46ee629c11a7adcf055421614f5d0656de9a60e4f2face90

                            • C:\Users\Admin\AppData\Local\Temp\RES7ED5.tmp
                              Filesize

                              1KB

                              MD5

                              11503c07851c56d8b16b5308380a66f3

                              SHA1

                              506ebd6985891236737d8a0bdbde8b19f3863e86

                              SHA256

                              7cbd9967a8768fc71d5be33cc72f4903a6c8d88aef357b4094a9444a0a2f9a4a

                              SHA512

                              e3e2b2ba8cc2a9e5297c37ea375b8ec58d071d52692fb15b2c64313e3e299c8d9338e8a1314f0b3395d86ac7130fe91e6904d6a5d4370bbe1bdf9f9147588e1b

                            • C:\Users\Admin\AppData\Local\Temp\RESABEF.tmp
                              Filesize

                              1KB

                              MD5

                              61a737c4b6f59fdf66cd9e7c2ec7b841

                              SHA1

                              4b8d47da5b26def386860e9729acf03c77f1d27f

                              SHA256

                              606f0b5700630968affe29230b7c7315d094b47baddf3b1083b04aeedd6b8e7f

                              SHA512

                              4077421100ca180247e0d4c7618f7dc635cbfa4e5b8d4426d8b4466720e8f66479b28402b05f2dee151ac560a1d84bedf780c97a561a715b45ee9578e68c5b37

                            • C:\Users\Admin\AppData\Local\Temp\RESAC39.tmp
                              Filesize

                              1KB

                              MD5

                              15e50e25d633539d7f2b57466a3834f8

                              SHA1

                              0da647dae3a75361b0566f0550115e894340f246

                              SHA256

                              4a1c9b042708abebfc26d5c7a68418e06b7bd663cc0877f7525810803d225c55

                              SHA512

                              7b5c80fba697721bc1fb64ccdad1a6cb575c406047f95b7e8fbeb825b53e8d02cea374ee4c94e2dee8d86ed11f76b4261541d1b3434368a458d3a290a39d1a96

                            • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\CLP.PS1
                              Filesize

                              81KB

                              MD5

                              dd89352a77b2032e1f2bbfc458573525

                              SHA1

                              14208f50e67217f0396996da1e8e68be40171591

                              SHA256

                              d36911b3311d4d5603335c534622f1ca96c5181ab82e49fc90146e7806c49a52

                              SHA512

                              9d14b75650334c6e054e550cccfcfb4f7a77393227e59979bbccea2d4aa679b5a34638dc23bb19e94a772072649be4a591b4c93aa869dcc9326825f3d22f3009

                            • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\Sys32.PS1
                              Filesize

                              120KB

                              MD5

                              716ed1eb9f6360328e92030d98496a46

                              SHA1

                              1ed50ee40df7602a1adae5c4c763bc2a30033c2a

                              SHA256

                              ac2c566783be636007299a27e8f3e79d2bc2d5931150ac5b6bc7aa031b9e4d4f

                              SHA512

                              e2c1a1012f1f1241dee507fb8c1a46bf16d297d7692e77efb77ef04c6658e5499f5cc925a53436aad842ae76c86bcab3115274d57d9b5dcf892f1194f1f09ae7

                            • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\iAmazon.exe
                              Filesize

                              2.8MB

                              MD5

                              d1030184711310725a604d31173362cc

                              SHA1

                              dc4b1c4b10361e322a6226f3f1e0f1121f0a9593

                              SHA256

                              73cd2bde631726e737fcdbd54b596ff3c39acce30caaf4181a2f32277955dd08

                              SHA512

                              3effff70c9f576406fa231c516c8917c7019675a253bd9bdfef88e7f048c1f77b77229795dbb4f83760f08fff5323e0b854e54a8b9730003865996f970acbc94

                            • C:\Users\Admin\AppData\Local\Temp\WindowsUpdate\iAmazon.exe
                              Filesize

                              2.8MB

                              MD5

                              d1030184711310725a604d31173362cc

                              SHA1

                              dc4b1c4b10361e322a6226f3f1e0f1121f0a9593

                              SHA256

                              73cd2bde631726e737fcdbd54b596ff3c39acce30caaf4181a2f32277955dd08

                              SHA512

                              3effff70c9f576406fa231c516c8917c7019675a253bd9bdfef88e7f048c1f77b77229795dbb4f83760f08fff5323e0b854e54a8b9730003865996f970acbc94

                            • C:\Users\Admin\AppData\Local\Temp\avpb20mv\avpb20mv.dll
                              Filesize

                              9KB

                              MD5

                              c41835389dd8c82606fdd6f837786a19

                              SHA1

                              7d8ca41f7588e57c6b253aa96cb992a445753c4a

                              SHA256

                              435de3bd832c76eeeb6e7f4f2c8ea179806566757bcbdbda8464d01c0cfd678d

                              SHA512

                              2f9fb9609174a4e70e228ef6f579c1be5d7458daa1fdbf9850961215f6608aff12a91362afb66497c5696154ab2a3264dce3a675bf44a9ffd0a48bdc3e6946c8

                            • C:\Users\Admin\AppData\Local\Temp\cwmgaok5\cwmgaok5.dll
                              Filesize

                              9KB

                              MD5

                              eb0c5b0990be23cb067c3671d0de2fd7

                              SHA1

                              d8f33130a192b02ab0e8ecdde81f152844c09eda

                              SHA256

                              8c1db63cf944a9d3be43f88bd6a32bcb680df1e7200af6051e1cad69d4535354

                              SHA512

                              2793c6be605e314d89247ffb32f9857f02c4a865d9ad2222f9a27ee7fd5d8808753a7272fbf98c63bdac330c1c0ac6f6f94996008ca4e25a483d6f63ccad4b6b

                            • C:\Users\Admin\AppData\Local\Temp\dw013elt\dw013elt.dll
                              Filesize

                              9KB

                              MD5

                              79a95191253694a428ee070a5d644033

                              SHA1

                              089e232bc697fbe84f6731a9dca140302ddc3b04

                              SHA256

                              946a77e41180a36ce27fb9812a16766a7fb5a765c0d3f55946ffc563484e4db5

                              SHA512

                              6fe0f652dba27461ee2f9b08ab7b079e798c2136008ace9b9f6adb2924119c04f5e573727eff07c4f1103907292f20195c036da41bc1a4134c61ba77ca1973c9

                            • C:\Users\Admin\AppData\Local\Temp\uv3h5eo0\uv3h5eo0.dll
                              Filesize

                              9KB

                              MD5

                              52b2976a7cea2a4c31454c9f027e2bf1

                              SHA1

                              48d2b4a8213b36316afacad457211833ebdd904a

                              SHA256

                              6abfe0e2182d6c98f4204a6b1f7b755c9d2840d0f9ee09279d36a5fda9561822

                              SHA512

                              17d3e647a61c5493b2722d0ff81b4e59de4599760c226b93f8cc3f1e7497ac649413cb870959456cf163a76757b773642ad47ebeb712d21d4e77a09fbb502a1a

                            • \??\c:\Users\Admin\AppData\Local\Temp\avpb20mv\CSCE9AA76D3E50F4977BF21C2C453D50DB.TMP
                              Filesize

                              652B

                              MD5

                              09c734070d3e5a779e03776eebfc881c

                              SHA1

                              79df655641979740b40fb627c57aea2e5cba9be1

                              SHA256

                              d5cd0bbdc3f9e08e907e49a74445493324e4114f287a918500b1556b9a09b363

                              SHA512

                              00b9faf64cc8338e6b76019899f502af956196991ff8b4213efda9d21e6d7dd69478879008b6780b2ace655801c7f749590ecc6a0deed18a3d0e253e980839ba

                            • \??\c:\Users\Admin\AppData\Local\Temp\avpb20mv\avpb20mv.0.cs
                              Filesize

                              17KB

                              MD5

                              7a3de43d349b7582a2d897183d26b322

                              SHA1

                              0145f5d6aa0d8bcd6b2bcdb9a17be08042699877

                              SHA256

                              aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6

                              SHA512

                              8d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962

                            • \??\c:\Users\Admin\AppData\Local\Temp\avpb20mv\avpb20mv.cmdline
                              Filesize

                              300B

                              MD5

                              ea5e8e8c616e84b73a75d07a3960ff14

                              SHA1

                              6d1f2294653b918a1120844f8cd6f30e001defe8

                              SHA256

                              07320d4ebfe457cfee3c168a4ae908f4498f73b048adabab0ed8217703db15e1

                              SHA512

                              487ead38bcc3355b21e07391723fcb8b68fbcc17decc0f4901bbc9e70dddfa4950e2d167203876002a750f43252e3ab5f3a15a71f9de71f818562534faa9bca6

                            • \??\c:\Users\Admin\AppData\Local\Temp\cwmgaok5\CSC4D20C0CEE8F24DDDB91FB4221652CB.TMP
                              Filesize

                              652B

                              MD5

                              b8b77f50abdab0c66e311116d90ee920

                              SHA1

                              66e19fffc689991364bb9eabbe385b91555e70d6

                              SHA256

                              cde7b82be01bd9d2ab30eabe1bf80e8a3c740460dc362840c96db43e39c82740

                              SHA512

                              41f81f98cfbc9f947702bf87df86b2b8ea2f917e01a2ec7cf8113f1924c836b9ba1320978ba34d10d07bfea8e8de9a22c371fbfc67f126d4786730ecbc445c49

                            • \??\c:\Users\Admin\AppData\Local\Temp\cwmgaok5\cwmgaok5.0.cs
                              Filesize

                              17KB

                              MD5

                              7a3de43d349b7582a2d897183d26b322

                              SHA1

                              0145f5d6aa0d8bcd6b2bcdb9a17be08042699877

                              SHA256

                              aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6

                              SHA512

                              8d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962

                            • \??\c:\Users\Admin\AppData\Local\Temp\cwmgaok5\cwmgaok5.cmdline
                              Filesize

                              300B

                              MD5

                              8487bfd9cd7bf11937f238debb2e14b7

                              SHA1

                              cd19dbace094411e0ce575587129510c85cc63ea

                              SHA256

                              e4bb2a475e9718cade28e560b3b8bd281453e75ce4f0bb12f136e6c4253c67b0

                              SHA512

                              7288c8f2b6f38a3e6e7bae6d62e57929bdfee50fd0d023d8ee9d919a6a7123d1c9c54a169e8e140b10801ae028da5ede6d42abe2589d33ad8a4856d046b216d7

                            • \??\c:\Users\Admin\AppData\Local\Temp\dw013elt\CSCDD559C3E30F942A687AC3718BB3E5F29.TMP
                              Filesize

                              652B

                              MD5

                              842ceb951190a3069ade41116bf4f590

                              SHA1

                              eb70f9a3c7c4cb26c9d43ad4b5a04f528eec2d66

                              SHA256

                              5dcd2987a81307f26eeaae735ab90a8f53079df5e1d3995781f43b88af4df6aa

                              SHA512

                              5556cd6af71a253222146d60e2e4afe893e05d0a43fc6d5c770a225993e63058ff6b25792f4e0be0690ebe91f4962f55281f7c96f4f3fa527e413d1888fb673f

                            • \??\c:\Users\Admin\AppData\Local\Temp\dw013elt\dw013elt.0.cs
                              Filesize

                              17KB

                              MD5

                              7a3de43d349b7582a2d897183d26b322

                              SHA1

                              0145f5d6aa0d8bcd6b2bcdb9a17be08042699877

                              SHA256

                              aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6

                              SHA512

                              8d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962

                            • \??\c:\Users\Admin\AppData\Local\Temp\dw013elt\dw013elt.cmdline
                              Filesize

                              300B

                              MD5

                              c1bca5ab2f300bee53830620e9ee7cc0

                              SHA1

                              fc732dd84d70dc288b5737ddbe23a6157e86e0a4

                              SHA256

                              35edada04448594a756ec06558fe63da41235068ba4c190f49ba33c8c0f13274

                              SHA512

                              5500e4cf93a3ec51210fcce3ae8acac89e75da6f34ae1da5a4f10aeae01ff03232b07436114ceee25a5daed3250b7df0e36634395b1da44dbfc3938753a60ac7

                            • \??\c:\Users\Admin\AppData\Local\Temp\ntv1ifhp\CSC466604F11B1041169B1F210ECCD6161.TMP
                              Filesize

                              652B

                              MD5

                              92c6090a8526a883712e659746acccfa

                              SHA1

                              7c033572be9a14825df6ecb95d1c7c17df6bacdd

                              SHA256

                              2484c4f523f1468777772eaa2330306f95dfcf56bae2619513c9193adb8ca91a

                              SHA512

                              bc382ed987adc20024a92581ee194f035687249fd09d35ef9e944adc6b00d9dd0d1467ebc6600a48f7344cf806796981e37503a322e967e6b204818310970443

                            • \??\c:\Users\Admin\AppData\Local\Temp\ntv1ifhp\ntv1ifhp.0.cs
                              Filesize

                              17KB

                              MD5

                              7a3de43d349b7582a2d897183d26b322

                              SHA1

                              0145f5d6aa0d8bcd6b2bcdb9a17be08042699877

                              SHA256

                              aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6

                              SHA512

                              8d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962

                            • \??\c:\Users\Admin\AppData\Local\Temp\ntv1ifhp\ntv1ifhp.cmdline
                              Filesize

                              300B

                              MD5

                              f97a3440a4195e652ac3314dea69d9c4

                              SHA1

                              0e5f6defe026087c64ef802865a04498f6ef478a

                              SHA256

                              cb629fa81a6eff7df26d670540091f0e21e962b01e48247c8ff2043fefc021c9

                              SHA512

                              5a6155407e29ef6a28fc98b13e430eb8dd10cc1c486d1846268ff34651d0c49a8cfc13c7ce20a0cb38407f5fbe469dbb12aedb82aa4909ce582fb63c6b565390

                            • \??\c:\Users\Admin\AppData\Local\Temp\uv3h5eo0\CSC3FCA6E9EAA434564BAA4D01A7C1ACDD.TMP
                              Filesize

                              652B

                              MD5

                              a2a9e01c1a55ec52037862c2a95ac908

                              SHA1

                              a1ac8e4cd3e00f147b3ba4a0099e6d7a720cffe6

                              SHA256

                              41cfea9fa300f853209931168389ecde9f63af843ce45ed521042d83ccd36c9d

                              SHA512

                              1d36190e3faf07d8fa7d72f29ac6d99a8ff1ae7945847d54c90593a45cca9fda96b7955b094cdb0c37b2b1bde088e7647c1356454703f38557de8b426132a564

                            • \??\c:\Users\Admin\AppData\Local\Temp\uv3h5eo0\uv3h5eo0.0.cs
                              Filesize

                              17KB

                              MD5

                              7a3de43d349b7582a2d897183d26b322

                              SHA1

                              0145f5d6aa0d8bcd6b2bcdb9a17be08042699877

                              SHA256

                              aa3ce1c0e59c08dbe0af96d1e96948658c50efd5e998aa7f8cf60219938348d6

                              SHA512

                              8d9df1a39c0e58318bddd82f19e0cd7e45e78bbf86ec7f329394d4ef8a2fcb203dd71abe85a987ba021fdc640a07a4053aea7e4a34453d21f85cb197c57cd962

                            • \??\c:\Users\Admin\AppData\Local\Temp\uv3h5eo0\uv3h5eo0.cmdline
                              Filesize

                              300B

                              MD5

                              740ed4c03492a4224a8e3abe1c45d6ad

                              SHA1

                              1777205cd555d7589e7e38fa35cf25ec130638e3

                              SHA256

                              0ed71c7898bd03bac1e7e10a76766c63b70c32785d09b0e42d4755d29157d044

                              SHA512

                              e16ed125e01ce5ab0f5e1d1a7f3376999a4cee174c58ec1689e1b829e8f0dceacb115493b9dd94c02ee22ed3e59bed443cbd80fbe02c003dae50363d315bf735

                            • memory/212-149-0x0000000000000000-mapping.dmp
                            • memory/212-177-0x0000000005740000-0x00000000057D2000-memory.dmp
                              Filesize

                              584KB

                            • memory/212-155-0x0000000000A00000-0x0000000000CC8000-memory.dmp
                              Filesize

                              2.8MB

                            • memory/212-172-0x0000000005CF0000-0x0000000006294000-memory.dmp
                              Filesize

                              5.6MB

                            • memory/212-178-0x00000000056E0000-0x00000000056EA000-memory.dmp
                              Filesize

                              40KB

                            • memory/448-181-0x0000000000EB0000-0x0000000000EB8000-memory.dmp
                              Filesize

                              32KB

                            • memory/448-183-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/960-197-0x0000000000000000-mapping.dmp
                            • memory/960-200-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/1072-165-0x0000000000000000-mapping.dmp
                            • memory/1440-130-0x0000000000FB0000-0x0000000001402000-memory.dmp
                              Filesize

                              4.3MB

                            • memory/1440-198-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/1440-131-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/1620-173-0x0000000000400000-0x0000000000408000-memory.dmp
                              Filesize

                              32KB

                            • memory/1620-174-0x0000000000403186-mapping.dmp
                            • memory/1764-218-0x0000000000000000-mapping.dmp
                            • memory/1804-148-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/1804-138-0x0000000000000000-mapping.dmp
                            • memory/2556-215-0x0000000000000000-mapping.dmp
                            • memory/2752-164-0x0000000000000000-mapping.dmp
                            • memory/2840-132-0x0000000000000000-mapping.dmp
                            • memory/3280-185-0x0000000000000000-mapping.dmp
                            • memory/3368-209-0x0000000000404F6E-mapping.dmp
                            • memory/3572-147-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/3572-136-0x0000000000000000-mapping.dmp
                            • memory/3576-156-0x0000000000000000-mapping.dmp
                            • memory/3696-193-0x0000000000404F6E-mapping.dmp
                            • memory/3836-157-0x0000000000000000-mapping.dmp
                            • memory/4068-176-0x0000000000404F6E-mapping.dmp
                            • memory/4068-175-0x0000000000400000-0x000000000040A000-memory.dmp
                              Filesize

                              40KB

                            • memory/4292-144-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/4292-135-0x0000000000000000-mapping.dmp
                            • memory/4640-145-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/4640-140-0x0000017525600000-0x0000017525644000-memory.dmp
                              Filesize

                              272KB

                            • memory/4640-134-0x0000000000000000-mapping.dmp
                            • memory/4652-213-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/4688-204-0x0000000000000000-mapping.dmp
                            • memory/4712-182-0x0000000000000000-mapping.dmp
                            • memory/4712-184-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/4800-139-0x0000000000000000-mapping.dmp
                            • memory/4800-151-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/4840-188-0x0000000000000000-mapping.dmp
                            • memory/4848-143-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/4848-133-0x0000000000000000-mapping.dmp
                            • memory/4848-137-0x000001B7F0790000-0x000001B7F07B2000-memory.dmp
                              Filesize

                              136KB

                            • memory/4848-153-0x000001B7F1AA0000-0x000001B7F1B16000-memory.dmp
                              Filesize

                              472KB

                            • memory/4856-214-0x00007FFF9A210000-0x00007FFF9ACD1000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/4856-212-0x0000000000000000-mapping.dmp
                            • memory/5012-201-0x0000000000000000-mapping.dmp