Analysis

  • max time kernel
    123s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    12-06-2022 23:39

General

  • Target

    PI098788765.js

  • Size

    229KB

  • MD5

    a94120f574ef044bd35a4e167d6e5a05

  • SHA1

    ec73c38470585db035b6a6716495afaaa83ff577

  • SHA256

    9081b8dc4bac6ddfe0a3c54ef32cb810be6b012a2d82ca70c3a4b9466b436086

  • SHA512

    5e737de130ac934ddc0ca6a3cc345a3e4da9f1c61f244ad79bab182da2e5173ae7633bbda78d3a375755140100b768c82e6e82b36ee27469e0252f4424ee7bdb

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

blessed147.ddns.net:8089

Mutex

RV_MUTEX

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • RevengeRat Executable 10 IoCs
  • Executes dropped EXE 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 7 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\PI098788765.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4284
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\dEvUnnXvDV.js"
      2⤵
        PID:4872
      • C:\Users\Admin\AppData\Local\Temp\REVX.exe
        "C:\Users\Admin\AppData\Local\Temp\REVX.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1332
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3456
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
              PID:3184
            • C:\Users\Admin\AppData\Roaming\Client.exe
              "C:\Users\Admin\AppData\Roaming\Client.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1076
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                5⤵
                • Drops startup file
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Checks processor information in registry
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4032
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                  6⤵
                    PID:4840
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\5zppr4at\5zppr4at.cmdline"
                    6⤵
                    • Drops startup file
                    • Suspicious use of WriteProcessMemory
                    PID:4660
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                      C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES844E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc51E6E01C7CC74C57B07982F1EEEA896E.TMP"
                      7⤵
                        PID:4900
                    • C:\Windows\SysWOW64\schtasks.exe
                      schtasks /create /sc minute /mo 1 /tn "Client" /tr "C:\Users\Admin\AppData\Roaming\Client.exe"
                      6⤵
                      • Creates scheduled task(s)
                      PID:1868
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\bxrwz1va\bxrwz1va.cmdline"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1820
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8846.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC340493EFA904CF5BF53B256572F1F38.TMP"
                        7⤵
                          PID:2628
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\yppnowgl\yppnowgl.cmdline"
                        6⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4016
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8A78.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc41D8DAE8ADE84482AB5F5919F291D40.TMP"
                          7⤵
                            PID:2052
                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\lt1siiy1\lt1siiy1.cmdline"
                          6⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3444
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8CE9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc67B5093AE7804647AB71589D6E4EC89.TMP"
                            7⤵
                              PID:2868
                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\0uawhix2\0uawhix2.cmdline"
                            6⤵
                              PID:3696
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES8E70.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc27343622245A4C9A8DCB19284D4A513.TMP"
                                7⤵
                                  PID:3860
                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kvpnspgn\kvpnspgn.cmdline"
                                6⤵
                                  PID:4912
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                    C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES916D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA158BD36C57422D8F389D58B14152F4.TMP"
                                    7⤵
                                      PID:2068
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\5fdiktuz\5fdiktuz.cmdline"
                                    6⤵
                                      PID:3500
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9313.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc122C375D5A894916AA3BC8665D10C873.TMP"
                                        7⤵
                                          PID:4880
                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ogap43dg\ogap43dg.cmdline"
                                        6⤵
                                          PID:3304
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES948A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1B5B13394C1543078340B6DE37FD7683.TMP"
                                            7⤵
                                              PID:1504
                                • C:\Users\Admin\AppData\Roaming\Client.exe
                                  C:\Users\Admin\AppData\Roaming\Client.exe
                                  1⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1592
                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                    2⤵
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2020
                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                      3⤵
                                        PID:4136

                                  Network

                                  MITRE ATT&CK Matrix ATT&CK v6

                                  Execution

                                  Scripting

                                  1
                                  T1064

                                  Scheduled Task

                                  1
                                  T1053

                                  Persistence

                                  Registry Run Keys / Startup Folder

                                  1
                                  T1060

                                  Scheduled Task

                                  1
                                  T1053

                                  Privilege Escalation

                                  Scheduled Task

                                  1
                                  T1053

                                  Defense Evasion

                                  Scripting

                                  1
                                  T1064

                                  Modify Registry

                                  1
                                  T1112

                                  Discovery

                                  Query Registry

                                  2
                                  T1012

                                  System Information Discovery

                                  3
                                  T1082

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegSvcs.exe.log
                                    Filesize

                                    142B

                                    MD5

                                    8c0458bb9ea02d50565175e38d577e35

                                    SHA1

                                    f0b50702cd6470f3c17d637908f83212fdbdb2f2

                                    SHA256

                                    c578e86db701b9afa3626e804cf434f9d32272ff59fb32fa9a51835e5a148b53

                                    SHA512

                                    804a47494d9a462ffa6f39759480700ecbe5a7f3a15ec3a6330176ed9c04695d2684bf6bf85ab86286d52e7b727436d0bb2e8da96e20d47740b5ce3f856b5d0f

                                  • C:\Users\Admin\AppData\Local\Temp\0uawhix2\0uawhix2.0.vb
                                    Filesize

                                    280B

                                    MD5

                                    66d5f881d65b01dd19c933ac8b2cfdf4

                                    SHA1

                                    2ca3216d7ec53bf28962a8384367c77349025cb4

                                    SHA256

                                    71b2f78e04c2cb8c5eaa8926bacf287a0aba0918d4b27942542dfe9fff1b3635

                                    SHA512

                                    6f789a5952644cd4fa09b597e6c2e1cfa8486c62a584ec1668df5372d88bbcaf83733bb1895c521fabeb78134174ffc55f76fd5eecf4e950c124fac1c2b17c92

                                  • C:\Users\Admin\AppData\Local\Temp\0uawhix2\0uawhix2.cmdline
                                    Filesize

                                    183B

                                    MD5

                                    b53e59965d321d4cf18bd4f6b2f595eb

                                    SHA1

                                    117427c3b51d6035ff0073cef5b475abaa24c8c4

                                    SHA256

                                    ddf85756e651868599cbc02c649b327d2dde159a797591f74d447281189edc32

                                    SHA512

                                    c2c165bcd635517776911b095fb95254c3a0cca7d511de997b9eaf8e72d71a746dfe46f92053131c1072af8d32c706316812c673db890b4cc1f5e471d7d3937d

                                  • C:\Users\Admin\AppData\Local\Temp\5fdiktuz\5fdiktuz.0.vb
                                    Filesize

                                    276B

                                    MD5

                                    daafc5d85e502708fa1d2578df114ee4

                                    SHA1

                                    e1ac79a3807da14f0f50a08d4d755bb10d7bdfd1

                                    SHA256

                                    6f051a06361dd14182c616462fb5be847ea41f0b1a7e70d6be11493fee0a672d

                                    SHA512

                                    6055168ec3467039b7359e3ed7468413e806162a2a076cac0010ce250f3d6dbc4d8821951764eb66e1a05eecddab7e008304ab712d49517c587e7d46bafee9ac

                                  • C:\Users\Admin\AppData\Local\Temp\5fdiktuz\5fdiktuz.cmdline
                                    Filesize

                                    179B

                                    MD5

                                    f873eb3b6cd1882fc41279c97478a06f

                                    SHA1

                                    27553f23e0201e2059df46c38bdecf2f8ac5713d

                                    SHA256

                                    da2a36d77c6c53a8b35ded785c8e0ed66cbb28e1ad44f8675697575a5cd15b2d

                                    SHA512

                                    837cef4e013cc4e771b053d5762d13d3a1aaa7a1116baccd812c034020b904fd5c849aa648e39cd324dc367e92f6e06e57bbe504132e5d9da16cb6be1cb26018

                                  • C:\Users\Admin\AppData\Local\Temp\5zppr4at\5zppr4at.0.vb
                                    Filesize

                                    151B

                                    MD5

                                    593cab3ac472165f12b8d423e5ee24b9

                                    SHA1

                                    cb8ebf1261c70fda1c364aba9ffc38d8654dda4c

                                    SHA256

                                    b548217ce1af95dfbad41f3adbc6f25b30d65d78fe11aa0cc9c7a1e86f0ef0d0

                                    SHA512

                                    5a3c47de2f48869ee25c3a5135fe176a5f9dcb4be50dab820053dba4d7890c21e30601e1717654aaac26b0fd908cf222105a7d0266ac425298bf9df84ebca5d1

                                  • C:\Users\Admin\AppData\Local\Temp\5zppr4at\5zppr4at.cmdline
                                    Filesize

                                    203B

                                    MD5

                                    d4506e703cbb2e8df4a7cd112389b1f6

                                    SHA1

                                    1f3e46e1ca1273e86b390f39698b6ee345f0c3ce

                                    SHA256

                                    27a7e0af4b72b7098b31f41c28b5f60f97d8b19fca2d2b2b094479681c682b50

                                    SHA512

                                    e4cb4ce0886bedb09d4a06de8e7bf8a3c501d8951ce23bc1b0c39d05049a69e7288def5f0a68b0f4c3872d3464e14494ca8d4455fbde69f764123124f8af6a65

                                  • C:\Users\Admin\AppData\Local\Temp\RES844E.tmp
                                    Filesize

                                    1KB

                                    MD5

                                    d8e940c3e4390e4538f549099ec40b71

                                    SHA1

                                    4072b06268fccef7bddceb7bb7bb2e769045e959

                                    SHA256

                                    15875d3c639b583c537e97aa0304a2465b098a1fbf3bf6c8aa51203e1fd922f9

                                    SHA512

                                    9baf55a682fc4175e08199c428afd97ce697630ce12f0e7711cb7825cdc0c27bc4098b039d17e5dfff2ec8ab7e1efd27540557554f137bd808e552783e2f3046

                                  • C:\Users\Admin\AppData\Local\Temp\RES8846.tmp
                                    Filesize

                                    1KB

                                    MD5

                                    717c02fb8ec791a6a8c443305950ef0a

                                    SHA1

                                    a5cebbc5ebd2566d6b1e68b08ec8140df484befe

                                    SHA256

                                    de84ae76c1c4a533533789a8869b8930d65ebbe0ac1f26d262aeb9bdbd83ee5c

                                    SHA512

                                    375bec6de30cddcb3e292f10de0bbb143f3e35521f95e9ca393e8db68e2958ed71d89ba15c24c7fcc10eec44f58c3b2ce804927ee7771ff3d53e197de49c9476

                                  • C:\Users\Admin\AppData\Local\Temp\RES8A78.tmp
                                    Filesize

                                    1KB

                                    MD5

                                    34dd223df537ee12ba1bd5abce38850a

                                    SHA1

                                    2b3c5d0abc06fae940b84cae87ada59aa8541a63

                                    SHA256

                                    094912594cdbc09bfabfe0a761e6bb6e5232aac2ebf88b5082853cef4d4dd177

                                    SHA512

                                    7bcc5968a4e2e5d70a8b262c93dfe4d6954042cc21b3d53cf1af699387d45741f992469e6e7cac85165b0031d682689bd076d05f156a1791f57209a4c891f49a

                                  • C:\Users\Admin\AppData\Local\Temp\RES8CE9.tmp
                                    Filesize

                                    1KB

                                    MD5

                                    5ed94e7aa0a664bd04589fd1746cd9a8

                                    SHA1

                                    2c429580369aaea04307caed604aaa8e369bb1ab

                                    SHA256

                                    45a33fcad552753ead7145d4d1487b0b5d2754942fec596ac5caffa3fc6d928a

                                    SHA512

                                    d6948e70ddcdd50ad08afd9d897dd999ca6211e6dd4a8cb3688ee1b995cc27078dc95e2c778ad017acf7117a4aaa286093179d503fd114d66acd083f2fed0d2c

                                  • C:\Users\Admin\AppData\Local\Temp\RES8E70.tmp
                                    Filesize

                                    1KB

                                    MD5

                                    bb6971f3ce050ae171e47ae1973cac7f

                                    SHA1

                                    1a2bdceb47c802b9d104d5a6d3240d17c11fb62f

                                    SHA256

                                    01bf3d1e10e207cdde693ef8d510149f4310c0c3a0f4e01cad73b7b26edc0c5c

                                    SHA512

                                    35c6e2afd8f69d675559d6b39f0e0a695fa14715f9eaae66917223fcac4be8b1cc4f99d4c1b458d3576c33a6d64ec06c42f2f17d6fa6b77bbc112fbdb68f8073

                                  • C:\Users\Admin\AppData\Local\Temp\RES916D.tmp
                                    Filesize

                                    1KB

                                    MD5

                                    f258ba3325aa53d51bd144092cf0c756

                                    SHA1

                                    58adf65b1110efe55f4d6a3f92af550b35123a4b

                                    SHA256

                                    3738e81afa83f3733d488a6b54e236bf571813336610f0e165486a92d9ed5a00

                                    SHA512

                                    88eab328965af2f36397c8fb4f28ce123950a1ebaa1bb707ca939ef06aa32a54611e2ac4828bccdc3c82d492661caf17298471de9745bbdde94f529d92d697e2

                                  • C:\Users\Admin\AppData\Local\Temp\RES9313.tmp
                                    Filesize

                                    1KB

                                    MD5

                                    39ae3ed928656559133784d9f284920b

                                    SHA1

                                    a8765ba061f100c0520a4e23c8280ceb0ce70a87

                                    SHA256

                                    6322093a7d673a63adf925da3ea4af12a42f00a6180612719163bec62b460075

                                    SHA512

                                    a60b915bad85d01a76869e5435eb1a43c22fc296170bb10a6686e3864cc9c749afacaa81194341d60db83c52dfc074d46041e53300a27d0a8152a9ad5d1fce59

                                  • C:\Users\Admin\AppData\Local\Temp\RES948A.tmp
                                    Filesize

                                    1KB

                                    MD5

                                    63005a3609ac86c0fdb4b85052198331

                                    SHA1

                                    b63a6cd0f65e4510ed7b383835fde83ece97f156

                                    SHA256

                                    d1a2d5644d4c57a2ee90ae8844b0500724a4098d33c26ddc4e3ad2ef6c75ca05

                                    SHA512

                                    a5fc55dd5d1c513ac4d4f40cf8066f30b21533ac4e9e7ce957621656681d510ec22c839a94dc29b99467575f139ef2a8b8a1cf581ed80f5d159ddd60431214c3

                                  • C:\Users\Admin\AppData\Local\Temp\REVX.exe
                                    Filesize

                                    92KB

                                    MD5

                                    2b6dc42dc5c0b40bf131dc3eb4f7b4ba

                                    SHA1

                                    277a44b6fc468199180efdab5c4151e5b772e2b9

                                    SHA256

                                    a2639ef31af5e1015463f0663982ae4bd10271f1660cdec494cfb8848b2c87a0

                                    SHA512

                                    98f993806bafe8924fe58e92d4441376350117eeb3b17f9e74221cbe4410376592050a7d05e3b914ca39eef63583356df0213def1510d6bb233f77ee45c6a11d

                                  • C:\Users\Admin\AppData\Local\Temp\REVX.exe
                                    Filesize

                                    92KB

                                    MD5

                                    2b6dc42dc5c0b40bf131dc3eb4f7b4ba

                                    SHA1

                                    277a44b6fc468199180efdab5c4151e5b772e2b9

                                    SHA256

                                    a2639ef31af5e1015463f0663982ae4bd10271f1660cdec494cfb8848b2c87a0

                                    SHA512

                                    98f993806bafe8924fe58e92d4441376350117eeb3b17f9e74221cbe4410376592050a7d05e3b914ca39eef63583356df0213def1510d6bb233f77ee45c6a11d

                                  • C:\Users\Admin\AppData\Local\Temp\bxrwz1va\bxrwz1va.0.vb
                                    Filesize

                                    277B

                                    MD5

                                    236ad6b9a4ee790879f87bbfa7290c8a

                                    SHA1

                                    eeb7ebc7e515464c01ff2f50bb6e1a6fa57b8536

                                    SHA256

                                    cc7975516c3339933079173b8d5ed82c56d64caddafe0547ca038963a10507e3

                                    SHA512

                                    df088a9e60ba398701d4c20435884e012b9e37d29dc174198683d634c5d8bf2cefd82fddeca37f9e9daa0ac3f78ca6088efabb8d16e5e6330ff122c732ffe767

                                  • C:\Users\Admin\AppData\Local\Temp\bxrwz1va\bxrwz1va.cmdline
                                    Filesize

                                    180B

                                    MD5

                                    45d7197e2c4e20bb1d8baa165e64fd90

                                    SHA1

                                    7a90f29f29b2fd03e62beca61fb0c3d01de5fec8

                                    SHA256

                                    ece54fa9591b1722b2920567b9cb8985d25e16c16a8c4a97cfd1af91648a9ed6

                                    SHA512

                                    c0c9bbcca080b5daf8fe12e229dfe5ef888b17b3b78c858d1895fcd8145a51675a30e807a0f09d7db240fa3e728ae5e92c3b07529b3232d518eb4396357a7276

                                  • C:\Users\Admin\AppData\Local\Temp\kvpnspgn\kvpnspgn.0.vb
                                    Filesize

                                    270B

                                    MD5

                                    bcf70c4f55da7b7d14727824db47f768

                                    SHA1

                                    3887b4b4bf4c0b13ae90f23c6fc3c17e99d3c8a6

                                    SHA256

                                    a9ba174973f0ac003feb63005f0ff3c505c38555a1242c09d0b8f728a2f8b0c7

                                    SHA512

                                    eabf266bb2b1e8585fa7b936f9ce771bb128e62fcdaeabf7552d099ff5a87e40d1de96a2ff086ffc8d10006961b0052c0d43d4098f5f701c554beec0e1e08f58

                                  • C:\Users\Admin\AppData\Local\Temp\kvpnspgn\kvpnspgn.cmdline
                                    Filesize

                                    173B

                                    MD5

                                    329dbdcf7f71d2f9d81ed7473dceaea0

                                    SHA1

                                    19e2283906af1aefa617ad0397067eabbe521efb

                                    SHA256

                                    7fb21181c39a897c1e447b41b51924c718513e85b1996ffa8fc099667bf306f1

                                    SHA512

                                    8ec66f9dd793bd5637542a998574884f63ee200fcb39a6f35f06f1f99517674e279798c31c971d56c0c90315e741905a3664cdb6af916301591ed501db705da0

                                  • C:\Users\Admin\AppData\Local\Temp\lt1siiy1\lt1siiy1.0.vb
                                    Filesize

                                    277B

                                    MD5

                                    86d1081cc45bb8e2a8a0a1ddf12c69fb

                                    SHA1

                                    1ca0a88989e299bcf4863fbb471e0bff4dbbe29d

                                    SHA256

                                    8a536e07fc61a79f12b6faf3a08a19a4cf860d9d526c339556f6c2a5c7e2c72d

                                    SHA512

                                    6b505ebd383010c7c8abaf474b47a855ae2b04ce9e351ae94760ea9427f22d0379c42c12f3ed1de937171cd0221925ae17de45fd06528b478ab618be94656328

                                  • C:\Users\Admin\AppData\Local\Temp\lt1siiy1\lt1siiy1.cmdline
                                    Filesize

                                    180B

                                    MD5

                                    c13ecf0c352544e6a66e5ebe56491250

                                    SHA1

                                    1dc9cf379e6bdc6b138000fa842ef0cc4d1c3c01

                                    SHA256

                                    3b8d38c332c727529a170c997d52e66eacfb8a6efc7ea7dccc467deb590fcc86

                                    SHA512

                                    ad9416f179395bdd1f731245c95ed6456aa4104675caaee829ab0b7fa73f758a2eb41288a56e16eb3da4023cd9bc3cb065b9cdbbb4c6f3a769c9dc2350a21201

                                  • C:\Users\Admin\AppData\Local\Temp\ogap43dg\ogap43dg.0.vb
                                    Filesize

                                    279B

                                    MD5

                                    aed73bceff373304e303b98416b69f2e

                                    SHA1

                                    ad8cd1c95a61172eaf69a5bf4d0b08a0b1d57cab

                                    SHA256

                                    0ef692d87e4a0458f35cdb6eff6dc20c880fa71208406017626c628e261ebd5f

                                    SHA512

                                    6d0bcfb962acb0e5a6b29268c863ad9393f10bb2a70463fbd783637d8effdac656b0c916b71214b57588939fae59ebb0c2455eba56468fb6a6aab5f4f64cb1fc

                                  • C:\Users\Admin\AppData\Local\Temp\ogap43dg\ogap43dg.cmdline
                                    Filesize

                                    182B

                                    MD5

                                    d28f5c3fb4f7db131d7fd52a1a39a398

                                    SHA1

                                    0c239080f5adfd7bebb87fa427660eca56bae5a7

                                    SHA256

                                    d180b044aa879b2ae7156f392fed6c6ba915001269ccbcb534f35ca125c14ccd

                                    SHA512

                                    925d93470a7cab35907c9a587a50a224f2d54f41297def2c7fd86a5ceee87a5bf5252b76ec2d52a915b37af9b39cbc98b8a295c6cd1ffab8ce4a76aef2f62ce5

                                  • C:\Users\Admin\AppData\Local\Temp\uZwfRtNHu.txt
                                    Filesize

                                    42B

                                    MD5

                                    400e04d926ca74410f4d8ebaac5c2e7e

                                    SHA1

                                    7f1129504b0ed902209586b90c8490502a5e693c

                                    SHA256

                                    73283710f5a8d16c345982f3b867e79e4e2912bfc3284c93d6299ee627d86ef6

                                    SHA512

                                    6de69b4668aabc3bb8c75d650a35bf6cb19c951ed0711d14672a0814f48fbc6d4041d52adf51c783c1fec99bae88d7dd09fa5ec2dd634a3f95012a6b91f5ae6f

                                  • C:\Users\Admin\AppData\Local\Temp\uZwfRtNHu.txt
                                    Filesize

                                    41B

                                    MD5

                                    ddacb8d91a476532677016ca8fa15154

                                    SHA1

                                    3e0ea6c24c766b6f05e1a36f47414bfa9f2cffb7

                                    SHA256

                                    fc66ce5a321ced54b4372b6b3933176680cfe42de956743e445b24ae53d24a65

                                    SHA512

                                    e61447050e38b910c9b95f0f203efc6be7c357183482c0de56979c29c1896b997e8b6c872558d13227e13b3aae1ce0934c861f3a718201b68539329d312980f9

                                  • C:\Users\Admin\AppData\Local\Temp\uZwfRtNHu.txt
                                    Filesize

                                    41B

                                    MD5

                                    ddacb8d91a476532677016ca8fa15154

                                    SHA1

                                    3e0ea6c24c766b6f05e1a36f47414bfa9f2cffb7

                                    SHA256

                                    fc66ce5a321ced54b4372b6b3933176680cfe42de956743e445b24ae53d24a65

                                    SHA512

                                    e61447050e38b910c9b95f0f203efc6be7c357183482c0de56979c29c1896b997e8b6c872558d13227e13b3aae1ce0934c861f3a718201b68539329d312980f9

                                  • C:\Users\Admin\AppData\Local\Temp\vbc122C375D5A894916AA3BC8665D10C873.TMP
                                    Filesize

                                    1KB

                                    MD5

                                    efa86d1097e3356b4f7173a380c71c68

                                    SHA1

                                    f5940b67a6a5f561ff6454929eff2fb03df8b382

                                    SHA256

                                    8ccd957c9cf2aa677ee3e872feaa327cba85201d1066ba2c702d0b103bff1b67

                                    SHA512

                                    c409a703465f22a2094381be7a5ec066a487cb42c043fefe15f0654f6820e6fc7047786d257da754f20b9cdc4a9f5bb07d6691492d8d30800c6bad607a15b354

                                  • C:\Users\Admin\AppData\Local\Temp\vbc1B5B13394C1543078340B6DE37FD7683.TMP
                                    Filesize

                                    1KB

                                    MD5

                                    d7d9f8d1ac18d21666caab1c2340838a

                                    SHA1

                                    a33791468a096f2ecd0b9d46a3550879ddb20b6b

                                    SHA256

                                    5131ea59abf4dc33da21ae8a0fa4302960428d430b974368bb294c50cf92d6ce

                                    SHA512

                                    2e4736a5e5635d5769fe1087add8fe3ec73286778485708882c3c98ab03b7b8b6e418b311218f093dc7946d1a5309a2738c08a6418dfc60e6c75406a14700f10

                                  • C:\Users\Admin\AppData\Local\Temp\vbc27343622245A4C9A8DCB19284D4A513.TMP
                                    Filesize

                                    1KB

                                    MD5

                                    24218d2d116d5c470e34a5da0f5ee7c3

                                    SHA1

                                    b6546a2bdb8ce0b664100214b63371cc75187132

                                    SHA256

                                    0604323dfcee505a3199d0029fbbd0ae4768a59dc14ca8fc75b6ea3b3c850063

                                    SHA512

                                    7c08cd603e78c633c8e9eba12094d92d32238b565caa15b96f7d554eae67e4556aba9aaad544e0eb5803519428c8987a404b4a680917be4e00ae82a9d8e7cc6e

                                  • C:\Users\Admin\AppData\Local\Temp\vbc41D8DAE8ADE84482AB5F5919F291D40.TMP
                                    Filesize

                                    1KB

                                    MD5

                                    369b17d06cfd628bfe04b3f677d21526

                                    SHA1

                                    b9d23c0dc5467f73fe2331eb584bd0c40b129d0e

                                    SHA256

                                    e95b4b80f5fad8e923641d423ecb96b591a208f2f898846cd9ef107e2cd7c2e7

                                    SHA512

                                    00826786585653c66a434589d0e231c9f37f055b642867faa2ca8cd735a138b5d38eeddf985d268b822cbdc29916f5993fde5bb1b7ef9395710d75f1d49230bd

                                  • C:\Users\Admin\AppData\Local\Temp\vbc51E6E01C7CC74C57B07982F1EEEA896E.TMP
                                    Filesize

                                    1KB

                                    MD5

                                    f79d4f009ed12db358d8ac93f0804345

                                    SHA1

                                    163b7cfe02be73d9602f5a9387dc7dbe7e9000eb

                                    SHA256

                                    0b353fcca887a01a42a8d5348301f6fbce2519850676b8e8cbbd5a710975848b

                                    SHA512

                                    beda88dc76f7fe331e5a6d0b10a8dbf1c389300e405f6bd6ccef81067d2bb260b9ba993675562a7ea1d274960ffb9cbf26aa695576524eff07143c828ae2edac

                                  • C:\Users\Admin\AppData\Local\Temp\vbc67B5093AE7804647AB71589D6E4EC89.TMP
                                    Filesize

                                    1KB

                                    MD5

                                    369b17d06cfd628bfe04b3f677d21526

                                    SHA1

                                    b9d23c0dc5467f73fe2331eb584bd0c40b129d0e

                                    SHA256

                                    e95b4b80f5fad8e923641d423ecb96b591a208f2f898846cd9ef107e2cd7c2e7

                                    SHA512

                                    00826786585653c66a434589d0e231c9f37f055b642867faa2ca8cd735a138b5d38eeddf985d268b822cbdc29916f5993fde5bb1b7ef9395710d75f1d49230bd

                                  • C:\Users\Admin\AppData\Local\Temp\vbcA158BD36C57422D8F389D58B14152F4.TMP
                                    Filesize

                                    1KB

                                    MD5

                                    32060b25f1b853322f55b00e646349eb

                                    SHA1

                                    3f48939a11387738bbdaaecf03302bf210653b11

                                    SHA256

                                    49e5606fb65b14e33097ca86115ea6c55061517334188958984941a116189d6c

                                    SHA512

                                    db81b28d76f9469e07c1f91c2557acb7109a5c35f35ecd29d41df61e18b934bf36a3569f01aa2d3dc649e54537669d6d7ba492ed25bd4596d04cd0d714e20d4d

                                  • C:\Users\Admin\AppData\Local\Temp\vbcC340493EFA904CF5BF53B256572F1F38.TMP
                                    Filesize

                                    1KB

                                    MD5

                                    efa86d1097e3356b4f7173a380c71c68

                                    SHA1

                                    f5940b67a6a5f561ff6454929eff2fb03df8b382

                                    SHA256

                                    8ccd957c9cf2aa677ee3e872feaa327cba85201d1066ba2c702d0b103bff1b67

                                    SHA512

                                    c409a703465f22a2094381be7a5ec066a487cb42c043fefe15f0654f6820e6fc7047786d257da754f20b9cdc4a9f5bb07d6691492d8d30800c6bad607a15b354

                                  • C:\Users\Admin\AppData\Local\Temp\yppnowgl\yppnowgl.0.vb
                                    Filesize

                                    278B

                                    MD5

                                    eb84077741ceac34a373a4dc66d22172

                                    SHA1

                                    5ab1f9461ca7575ec0d9fc7e7a378760b0eedb8d

                                    SHA256

                                    4a96ff465232719d0d0084b487e4d42873a76e76093503bb0a05883ac5ff8d41

                                    SHA512

                                    00b73015bf16547e762b447d4d994a9d6f734cc45f345d4a388c78fd6b8523510c72d29bc8917a85fad8d78c891b6d10f37f70177d3e236a59a0470b26ad3e3d

                                  • C:\Users\Admin\AppData\Local\Temp\yppnowgl\yppnowgl.cmdline
                                    Filesize

                                    181B

                                    MD5

                                    42609db5d97f729c36ea4fe0e9f95d05

                                    SHA1

                                    df2f927fee3a463acba43a535c9f8de783355e39

                                    SHA256

                                    6c066d149096dcf75b02aa3eac72f7a4b322d49944826c2f75a7afb25c348886

                                    SHA512

                                    f291d793a012fe6e115a5066fb4145979d3d3913284e404b9457968e5443006a99765183c3b54a93c371a164962796490d0a5367a81c1b52377a4da603d4f25b

                                  • C:\Users\Admin\AppData\Roaming\Client.exe
                                    Filesize

                                    92KB

                                    MD5

                                    2b6dc42dc5c0b40bf131dc3eb4f7b4ba

                                    SHA1

                                    277a44b6fc468199180efdab5c4151e5b772e2b9

                                    SHA256

                                    a2639ef31af5e1015463f0663982ae4bd10271f1660cdec494cfb8848b2c87a0

                                    SHA512

                                    98f993806bafe8924fe58e92d4441376350117eeb3b17f9e74221cbe4410376592050a7d05e3b914ca39eef63583356df0213def1510d6bb233f77ee45c6a11d

                                  • C:\Users\Admin\AppData\Roaming\Client.exe
                                    Filesize

                                    92KB

                                    MD5

                                    2b6dc42dc5c0b40bf131dc3eb4f7b4ba

                                    SHA1

                                    277a44b6fc468199180efdab5c4151e5b772e2b9

                                    SHA256

                                    a2639ef31af5e1015463f0663982ae4bd10271f1660cdec494cfb8848b2c87a0

                                    SHA512

                                    98f993806bafe8924fe58e92d4441376350117eeb3b17f9e74221cbe4410376592050a7d05e3b914ca39eef63583356df0213def1510d6bb233f77ee45c6a11d

                                  • C:\Users\Admin\AppData\Roaming\Client.exe
                                    Filesize

                                    92KB

                                    MD5

                                    2b6dc42dc5c0b40bf131dc3eb4f7b4ba

                                    SHA1

                                    277a44b6fc468199180efdab5c4151e5b772e2b9

                                    SHA256

                                    a2639ef31af5e1015463f0663982ae4bd10271f1660cdec494cfb8848b2c87a0

                                    SHA512

                                    98f993806bafe8924fe58e92d4441376350117eeb3b17f9e74221cbe4410376592050a7d05e3b914ca39eef63583356df0213def1510d6bb233f77ee45c6a11d

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Client.exe
                                    Filesize

                                    92KB

                                    MD5

                                    2b6dc42dc5c0b40bf131dc3eb4f7b4ba

                                    SHA1

                                    277a44b6fc468199180efdab5c4151e5b772e2b9

                                    SHA256

                                    a2639ef31af5e1015463f0663982ae4bd10271f1660cdec494cfb8848b2c87a0

                                    SHA512

                                    98f993806bafe8924fe58e92d4441376350117eeb3b17f9e74221cbe4410376592050a7d05e3b914ca39eef63583356df0213def1510d6bb233f77ee45c6a11d

                                  • C:\Users\Admin\AppData\Roaming\dEvUnnXvDV.js
                                    Filesize

                                    23KB

                                    MD5

                                    0891f3f02d5ce4faa78ba53a23f0433f

                                    SHA1

                                    10f8ba0c20259d28c28743f64d341280c314397d

                                    SHA256

                                    b5413d8252009618b5692ef92948b1ae2afc1de266c491b7b9927ed4715cc595

                                    SHA512

                                    abcb34dd8e06e64a61328a72750f6a32832c147e8340c3702a4d71d4ced4353585c58b522692b7bc14f243be9ff782611cca03156b46ba2aaa3eb36f064954fd

                                  • memory/1076-145-0x0000000000000000-mapping.dmp
                                  • memory/1076-149-0x00007FFF91E10000-0x00007FFF92846000-memory.dmp
                                    Filesize

                                    10.2MB

                                  • memory/1332-135-0x00007FFF93800000-0x00007FFF94236000-memory.dmp
                                    Filesize

                                    10.2MB

                                  • memory/1332-132-0x0000000000000000-mapping.dmp
                                  • memory/1504-202-0x0000000000000000-mapping.dmp
                                  • memory/1592-206-0x00007FFF928D0000-0x00007FFF93306000-memory.dmp
                                    Filesize

                                    10.2MB

                                  • memory/1820-163-0x0000000000000000-mapping.dmp
                                  • memory/1868-162-0x0000000000000000-mapping.dmp
                                  • memory/2020-208-0x0000000000407CEE-mapping.dmp
                                  • memory/2052-172-0x0000000000000000-mapping.dmp
                                  • memory/2068-190-0x0000000000000000-mapping.dmp
                                  • memory/2628-166-0x0000000000000000-mapping.dmp
                                  • memory/2868-178-0x0000000000000000-mapping.dmp
                                  • memory/3184-141-0x0000000000000000-mapping.dmp
                                  • memory/3184-142-0x0000000000400000-0x000000000040E000-memory.dmp
                                    Filesize

                                    56KB

                                  • memory/3184-144-0x00000000050C0000-0x00000000050FC000-memory.dmp
                                    Filesize

                                    240KB

                                  • memory/3304-199-0x0000000000000000-mapping.dmp
                                  • memory/3444-175-0x0000000000000000-mapping.dmp
                                  • memory/3456-138-0x0000000005560000-0x00000000055FC000-memory.dmp
                                    Filesize

                                    624KB

                                  • memory/3456-136-0x0000000000400000-0x000000000041C000-memory.dmp
                                    Filesize

                                    112KB

                                  • memory/3456-140-0x0000000005600000-0x0000000005666000-memory.dmp
                                    Filesize

                                    408KB

                                  • memory/3456-137-0x0000000000407CEE-mapping.dmp
                                  • memory/3456-139-0x0000000005C40000-0x00000000061E4000-memory.dmp
                                    Filesize

                                    5.6MB

                                  • memory/3500-193-0x0000000000000000-mapping.dmp
                                  • memory/3696-181-0x0000000000000000-mapping.dmp
                                  • memory/3860-184-0x0000000000000000-mapping.dmp
                                  • memory/4016-169-0x0000000000000000-mapping.dmp
                                  • memory/4032-151-0x0000000000407CEE-mapping.dmp
                                  • memory/4032-150-0x0000000000400000-0x000000000041C000-memory.dmp
                                    Filesize

                                    112KB

                                  • memory/4136-209-0x0000000000000000-mapping.dmp
                                  • memory/4660-155-0x0000000000000000-mapping.dmp
                                  • memory/4840-152-0x0000000000000000-mapping.dmp
                                  • memory/4872-130-0x0000000000000000-mapping.dmp
                                  • memory/4880-196-0x0000000000000000-mapping.dmp
                                  • memory/4900-159-0x0000000000000000-mapping.dmp
                                  • memory/4912-187-0x0000000000000000-mapping.dmp