Analysis

  • max time kernel
    27s
  • max time network
    28s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2024, 02:37

General

  • Target

    RevengeRAT.exe

  • Size

    4.0MB

  • MD5

    1d9045870dbd31e2e399a4e8ecd9302f

  • SHA1

    7857c1ebfd1b37756d106027ed03121d8e7887cf

  • SHA256

    9b4826b8876ca2f1378b1dfe47b0c0d6e972bf9f0b3a36e299b26fbc86283885

  • SHA512

    9419ed0a1c5e43f48a3534e36be9b2b03738e017c327e13586601381a8342c4c9b09aa9b89f80414d0d458284d2d17f48d27934a6b2d6d49450d045f49c10909

  • SSDEEP

    1536:SGZiTHzreu+4SHYEJicHHkxcPiwlJ6BjQaJ7ehgQpmnp3bDBq+AD3tSYxV:Z8AHxicHEuP5l/aJ7ehgiYDk9SYz

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • Uses the VBS compiler for execution 1 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RevengeRAT.exe
    "C:\Users\Admin\AppData\Local\Temp\RevengeRAT.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4716
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3080
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ciuyveqt.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4964
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEC15.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB7E7C704F585420BBD9184E46FC7FB37.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4896
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\-zm0784g.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:876
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESECB2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc139332269EA42B79ACA703F5A5D21.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2912
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\97efatgq.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:216
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESED0F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc853F43D29F3541AA8283DEE7FCA95C1.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4536
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ldigbqfx.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:5032
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESED9C.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcED14B3CB7584A54999D4882726658B.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2092
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\a8ow3dsy.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4240
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEE29.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc2282817D633A42CCB3251520125F8AB6.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1064
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\pqkw82em.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3712
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEEA6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc25C2A2CD15E6440B8EF1D85FFCC410D8.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4724
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\z_rt6beb.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4876
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEF13.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB49944DE431E4E07BF7F9DA9578519B6.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3556
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wzga79zk.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4584
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESEF90.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC40C534086154A7E9D38B56B9BC583B.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3600
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\rz3fdwnd.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1704
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF00D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE86687C8CDD1499ABA163D39289AD52.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4704
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fvzgqgkd.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2572
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESF07A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcDAF24A696CFB4F7BBBF7C46B6F27E2DA.TMP"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1504
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\czxdge-l.cmdline"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3288

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\svchost\vcredist2010_x64.log-MSI_vc_red.msi.ico

    Filesize

    4KB

    MD5

    fde1b01ca49aa70922404cdfcf32a643

    SHA1

    b0a2002c39a37a0ccaf219d42f1075471fd8b481

    SHA256

    741fe085e34db44b7c8ae83288697fab1359b028411c45dab2a3ca8b9ea548a5

    SHA512

    b6b4af427069602e929c1a6ce9d88c4634f0927b7292efb4070d15fb40ce39fc5ce868452dcd5642b2864730502de7a4c33679c936beb1a86c26a753d3f4dc25

  • C:\ProgramData\svchost\vcredist2010_x64.log.ico

    Filesize

    4KB

    MD5

    bb4ff6746434c51de221387a31a00910

    SHA1

    43e764b72dc8de4f65d8cf15164fc7868aa76998

    SHA256

    546c4eeccca3320558d30eac5dc3d4726846bdc54af33aa63ac8f3e6fc128506

    SHA512

    1e4c405eca8d1b02147271095545434697d3d672310b4ea2ecca8715eaa9689be3f25c3d4898e7a4b42c413f258eda729a70f5ad8bc314a742082b5a6a8e9ff1

  • C:\Users\Admin\AppData\Local\Temp\-zm0784g.0.vb

    Filesize

    355B

    MD5

    acd609faf5d65b35619397dc8a3bc721

    SHA1

    ba681e91613d275de4b51317a83e19de2dbf1399

    SHA256

    4cfd86d51d0133dda53ba74f67ffe1833b4c0e9aae57afe2405f181fc602f518

    SHA512

    400ffd60ce7201d65e685734cea47a96abca58ca2babda8654b1d25f82d2766ca862a34f46c827249a4dc191d48f56005a9f242765d7becdda1344b8741a9d8c

  • C:\Users\Admin\AppData\Local\Temp\-zm0784g.cmdline

    Filesize

    224B

    MD5

    512ed2de9548c34b7e41f7844fb2ea3a

    SHA1

    672ab6fd98816b8fe99a12e476fa26725e85540d

    SHA256

    6237d3d169183eb2edca222f74bb5e6f29ccf1a885d2348b27a0be1dc8dd2ada

    SHA512

    d8141dd07b15f90118817dc93a41934094ffc6593379486f0b5c4a33e5cf15caea211d14e7b870ddc69092633213e5602637cc540246f2205284b50abb295cc5

  • C:\Users\Admin\AppData\Local\Temp\97efatgq.0.vb

    Filesize

    369B

    MD5

    83f6067bca9ba771f1e1b22f3ad09be3

    SHA1

    f9144948829a08e507b26084b1d1b83acef1baca

    SHA256

    098cd6d0243a78a14ce3b52628b309b3a6ac6176e185baf6173e8083182d2231

    SHA512

    b93883c7018fdd015b2ef2e0f4f15184f2954c522fd818e4d8680c06063e018c6c2c7ae9d738b462268b0a4a0fe3e8418db49942105534361429aa431fb9db19

  • C:\Users\Admin\AppData\Local\Temp\97efatgq.cmdline

    Filesize

    253B

    MD5

    58d1e64c52928e2669a315eb6b8c207e

    SHA1

    63fdb8480c404750c6368b25dde4d83e61a4a517

    SHA256

    41620cf2a931e4ed1aada34e4c1da2c0c507021889b613eb61487e83b48bf86d

    SHA512

    64b9f0168416f393393abbe573836508e637c63f80d9a2b303d0aedb212841cf56dbcefac69fa6281b330e31c17607a56a65ff7cc0ffa3d07c158dfae43c754a

  • C:\Users\Admin\AppData\Local\Temp\RESEC15.tmp

    Filesize

    5KB

    MD5

    7383a7a505b409d7eb826effbe56eba3

    SHA1

    1d425ff2465a328ea3731d98d6d64d7e17229b49

    SHA256

    80d01ff0017de77fae0f02ac76b16944474a032ca4660a249037d1d62cab9acb

    SHA512

    25a8ea5322e6cc3314e576dbb0609e271213906b4a32cad8c2fe57a2398a335f511e564278ce7aca766fbbf65828931d2a12413b375b8a171a27522f8ad1651c

  • C:\Users\Admin\AppData\Local\Temp\RESECB2.tmp

    Filesize

    5KB

    MD5

    89edced69d983a8cd38f2ccca4b8d936

    SHA1

    3b4c4729760e97d694c7ad6788b815590a665a11

    SHA256

    2866b9d29743ee09c50493f0671e3747cfe5478cf81e91444dd5e0e11a13c747

    SHA512

    c37b3df2ac895e5ab52a44d05b56b5664dcea32fce4dd3007b710542de9b7f191e8cd9fd06720a157ef0f4be5d9ff71ef3673a27ba8ad7f694da0f44b10de5d5

  • C:\Users\Admin\AppData\Local\Temp\RESED0F.tmp

    Filesize

    5KB

    MD5

    f2b67f3092d62e7e877a878147ecbe83

    SHA1

    f17648b9100ffc572c09e5e5a76ec77982a9582d

    SHA256

    39fddc94496b5900ff9b97bb82ef383c7177cd3a90f441a444163041ca331072

    SHA512

    182f6df7cbe40402f8003167cd44539ecb6e562b7b5696e0c74ec8e54d75ccb59a8f4dfc6fb669ddfb548270843c8595b7cb7f434db44ba7ce372edec33713e2

  • C:\Users\Admin\AppData\Local\Temp\RESED9C.tmp

    Filesize

    5KB

    MD5

    e3e8e45e3124d2559369287eeb09bcdc

    SHA1

    4cdd68260f93a55757cf127ad9eb5b9659e5b395

    SHA256

    147eb297b8f4f46519f888a29efa9ebe891b2334688e3a47d11d69cbb5e78c0b

    SHA512

    692b5539dc35f2f8184c6079beb933c48993160aa287466c881d2c3335f90bb9e049a1bb1f821a32917d0f25e3fade71435ba00b4dda617fccfab90148838e12

  • C:\Users\Admin\AppData\Local\Temp\RESEE29.tmp

    Filesize

    5KB

    MD5

    010936ad19cd9e91e1e2512bcc047a0b

    SHA1

    0286715bdaf01cb2950dfed239a3295ec76a5aa6

    SHA256

    68418d8192e87b762255b681ea630afacab2543afa006a77f289f693cf3ce680

    SHA512

    dc87dd1e1d14cdf294f9c77ceb9d61fcca6cbf618aacd37551a737ec5aa3f45398cb59dee5076d8c2345f021ee0be56afe09f631d0273fb1ef0ea8ee5f07e15c

  • C:\Users\Admin\AppData\Local\Temp\RESEEA6.tmp

    Filesize

    5KB

    MD5

    020275ae10c44612c39a116497481b23

    SHA1

    fc66a1785809411f184330566dc23c5be5e9c2cc

    SHA256

    b3a162e528e7f6edcba8056d94d9544df67f46f39a74a19a5194b4d02438f0f6

    SHA512

    694e8cb45ec1a4b5e2f12e8746adb0aa2b65ca702b6a1aa7f963ec0898881657cd3323f58958c886638b18259b924995d3049e37ec216ca38103ef3e78c4a561

  • C:\Users\Admin\AppData\Local\Temp\RESEF13.tmp

    Filesize

    5KB

    MD5

    ee73b9f1d697d36331f8489f300b82c2

    SHA1

    5d8e1fb0d6ce377f6341a7b55b382d5e73415d2d

    SHA256

    af7116aa907c23784bf6479f22310da11cd17cbf6cb1f794b135801a61d5d24b

    SHA512

    2dd8c667d32f3d42514ef68e3c0863e94a64993c90249cf393dcf639f6f7f09a55bb387074e9ca99ad0ab19eed0e50ce1f1f457fb7994d70d11fbb663bdba4fd

  • C:\Users\Admin\AppData\Local\Temp\RESEF90.tmp

    Filesize

    5KB

    MD5

    382f848659de55f7073910293c47a950

    SHA1

    0c664f5eb0c4d4b03813981acaab30798b172d3f

    SHA256

    1599347b5c27ea1d5b4d40991e8659eed2e5b4e1f208e5504f37a6a46c2c0ecf

    SHA512

    b3c34f1f780c4d22a4abd36639deffc9654565a27fdde42a5161469b8c41877695e46cd4ec751954b3c5bdb233d8443c2cc36de6be50466527de0661e1952f0e

  • C:\Users\Admin\AppData\Local\Temp\RESF00D.tmp

    Filesize

    5KB

    MD5

    d521684211b8fd7430e3a82f6a6868e3

    SHA1

    1f5bb56ca9f6b59bfe1049cf527977be8be5cd16

    SHA256

    7e32192a8932c51a017b365f3c26e105c45ca5b74d18a4fb323150d5d12cc01c

    SHA512

    5f24d233a08da13c6f2f0f41c027371fe8d2028ad42d60834f487ea865268b8e77cea7bf3720d7d44578fd36b592147eb4489fa9d1cfe25d8d06905f0cee2d64

  • C:\Users\Admin\AppData\Local\Temp\RESF07A.tmp

    Filesize

    5KB

    MD5

    81d41266ab5a8a59e16f33f487c5a4ec

    SHA1

    9671406734ba3e1988974ea9980803b3760957c3

    SHA256

    ea6e435f26c4ced5887f3d7c2d04c66ac1ae51b0d621f1a7c747846434238596

    SHA512

    a4a93c108ae143f2a4dd567bc78315eb9d134b12b7d6492a12675b43824c7a75aca8c93f1754c46326ada27b362d9090fca0eb0934e3d4bd9c1dcf0e46f571bc

  • C:\Users\Admin\AppData\Local\Temp\a8ow3dsy.0.vb

    Filesize

    373B

    MD5

    197e7c770644a06b96c5d42ef659a965

    SHA1

    d02ffdfa2e12beff7c2c135a205bbe8164f8f4bc

    SHA256

    786a6fe1496a869b84e9d314cd9ca00d68a1b6b217553eff1e94c93aa6bc3552

    SHA512

    7848cdc1d0ec0ca3ec35e341954c5ca1a01e32e92f800409e894fd2141a9304a963ada6a1095a27cc8d05417cd9c9f8c97aed3e97b64819db5dd35898acac3b7

  • C:\Users\Admin\AppData\Local\Temp\a8ow3dsy.cmdline

    Filesize

    261B

    MD5

    ee774c5e07a0f6afb756e8c1f9e20566

    SHA1

    00e501d690c411c0bd5b040b37bc51c061afe0a2

    SHA256

    c990c0253e2fc4d64ffaf08f82e86a84cd3225b553a97754eb3f836a7fee9a35

    SHA512

    67b43e44fd7319d1d77a774a0d84407c5f5042ea5d2a7c722bd19fe626b185e5fdebf3854a20fae9e29a805ce7f8cd9758e68dc6c722e082472540a6990b1131

  • C:\Users\Admin\AppData\Local\Temp\ciuyveqt.0.vb

    Filesize

    369B

    MD5

    e4a08a8771d09ebc9b6f8c2579f79e49

    SHA1

    e9fcba487e1a511f4a3650ab5581911b5e88395d

    SHA256

    ef4c31d167a9ab650ace2442feeec1bf247e7c9813b86fbea973d2642fac1fb6

    SHA512

    48135e0de7b1a95d254ae351ccac0cb39c0d9a46c294507e4bf2b582c780c1b537487161396dd69584c23455950f88512e9931dbff4287c1072938e812a34dd1

  • C:\Users\Admin\AppData\Local\Temp\ciuyveqt.cmdline

    Filesize

    253B

    MD5

    a8cf4aa5309096b4a57a0e02705a1df0

    SHA1

    37066a5900b956c341345b69e189b34af6509e4e

    SHA256

    b72f4713adffb51e829eace68dd913d30e447a37026008f3044ff253c44b26c2

    SHA512

    60dc96ed57b488fa072fa773d20497adebe2c050eac28aab504876185d6f2fdbc714fc066c46346f92f3ad00896dde17ffa9fdc57300287971145f606a18d28d

  • C:\Users\Admin\AppData\Local\Temp\czxdge-l.cmdline

    Filesize

    265B

    MD5

    7de625c0889e896fab167f178352c234

    SHA1

    3867dfd5aa4618cdb62be14f534e7ce18ac6fcf9

    SHA256

    95ab541be89d07f41e5b1e0bd0d2f1f1c8f8c58f9268508dd1152a1321764c7b

    SHA512

    068b0d2691863c3bc2a950c60fa8abfa687889c3d3514125858b08bf7be899b087d64cf097386042f5e5b4acc15a3d5e2c434df47a22af98ccd15911d97c79fa

  • C:\Users\Admin\AppData\Local\Temp\fvzgqgkd.0.vb

    Filesize

    378B

    MD5

    a52a457213a9d0522f73418af956a9ef

    SHA1

    cd46e651cb71f2b3736108d58bd86c7cf3794ecc

    SHA256

    be60d63078e797b8b46dc31f978e20e9819ef09b6fd3d5869934ace0530f23f7

    SHA512

    9d3458eefcd36539d4e97ed847f06faf96e0a8445e1d352d6a77506a042f513fb39523f90eff3aa1ef06afb000371e94d1968bc61d28bfb00f2a8cbbcc2eb3c2

  • C:\Users\Admin\AppData\Local\Temp\fvzgqgkd.cmdline

    Filesize

    271B

    MD5

    32e1e38290008ee39c31041482a5d6fc

    SHA1

    8d34a5e03d2efc7905c04a5cd099ef40cc961ce0

    SHA256

    b83a7ba2cf85c8fac9ed325fd448bd7b1d67ffef862ddecb08357808e5dc8d2d

    SHA512

    1690f0d72a105139894dd620654175a7e98e48bfc83d401c1c2d11a241643a941c531f87f7abe0951828bfdbc09ab79ac08a85ca2ab301cfef9be4b3ef759b07

  • C:\Users\Admin\AppData\Local\Temp\ldigbqfx.0.vb

    Filesize

    355B

    MD5

    6e4e3d5b787235312c1ab5e76bb0ac1d

    SHA1

    8e2a217780d163865e3c02c7e52c10884d54acb6

    SHA256

    aec61d3fe3554246ea43bd9b993617dd6013ad0d1bc93d52ac0a77410996e706

    SHA512

    b2b69516073f374a6554483f5688dcdb5c95888374fb628f11a42902b15794f5fa792cf4794eae3109f79a7454b41b9be78296c034dd881c26437f081b4eaea8

  • C:\Users\Admin\AppData\Local\Temp\ldigbqfx.cmdline

    Filesize

    224B

    MD5

    66ec0a98b31505130295799258f7755e

    SHA1

    9d0be9f278fc1a4f92f2a39a796f0f557b5b55da

    SHA256

    1def181e90bffbbb47a076ed02923c5a11dee6b4474e625542650efa4cefc9f3

    SHA512

    511c14ad4275209a7186038668a071949e0fc3abe8c6f0816d76534d3736833123ac84a64b01d6d5f2c8fa9e9d8bd04a23e9cab898add49eaed5c49fbdaf9de7

  • C:\Users\Admin\AppData\Local\Temp\pqkw82em.0.vb

    Filesize

    376B

    MD5

    7a8e43324d0d14c80d818be37719450f

    SHA1

    d138761c6b166675a769e5ebfec973435a58b0f4

    SHA256

    733f757dc634e79bdc948df6eff73581f4f69dd38a8f9fafae1a628180bf8909

    SHA512

    7a84dbe0f6eebdc77fd14dd514ed83fb9f4b9a53b2db57d6d07c5ff45c421eac15fdc5e71c3bc9b5b5b7c39341d8e3157a481d9dacefe9faff092478a0cea715

  • C:\Users\Admin\AppData\Local\Temp\pqkw82em.cmdline

    Filesize

    267B

    MD5

    df9822eb197a4b4f8e0ed0ca0427c488

    SHA1

    63b73ade51b0a10082afd9c67b60a9615a47f875

    SHA256

    3d388407e43f3491ac3d5207835307c92d1140981b05656e4cd1a093259fcd55

    SHA512

    cd4f698162e61cbf4c4b75877df6d8211a0525c1489cafc3382368ca68fca5dc230c51ddcc3b730f8e204c91053caa3c774e218f1d8b8e0947114a07a9b41a0a

  • C:\Users\Admin\AppData\Local\Temp\rz3fdwnd.0.vb

    Filesize

    375B

    MD5

    085f35c737b484465e1799359126ee1c

    SHA1

    f51feaf15af726cb9cbc151cd86b9913e428abcb

    SHA256

    940fb15c66dc34a66b192569ec3588a11285af4f7230c27d54191dcff5dd5b1e

    SHA512

    8314ec82f79a6dbd1e946be25984635c149ef6689e33d8010680f5bdf3bc8803bc14d8dbaa92717fec261d7f27e8f87384478130c3fe5ee37f3ec84fa2bf1402

  • C:\Users\Admin\AppData\Local\Temp\rz3fdwnd.cmdline

    Filesize

    265B

    MD5

    6e4178342e37a75b299b669ae121f6b4

    SHA1

    348ce3a436b50e706c68fcc28c5e9359968c3561

    SHA256

    b08154e5f743d11cd9dcd8173e7dd00717e70454c35fbd2f303e22e0262521cc

    SHA512

    85839ca0d64409dd665e92093a7b23c9428443d06723848e18f140eee4c709db12274c53008362e7304c5eec94ba8b5431aa58e5920bdb5726016ac478b7c4ad

  • C:\Users\Admin\AppData\Local\Temp\uRClgZblR.txt

    Filesize

    48B

    MD5

    927d973950bd5fed1c49b57432117d5f

    SHA1

    197a5267707a8b6503728c11aced2c44a1e952c4

    SHA256

    30e4bfd472dfe004fdbc162f8ed3989a20bb39b7a8aa436b88b69817960efb00

    SHA512

    3504742d0a960dfe9211eb971a2464dd49fe2e140bf32bd375fb5fcb277ee97766cf5c7a2ab31382fc49bce7118ab63f30006b92a23eba18dfe138f3f03f90d0

  • C:\Users\Admin\AppData\Local\Temp\vbc139332269EA42B79ACA703F5A5D21.TMP

    Filesize

    5KB

    MD5

    abeaa4a5b438ffa58d07d9459e5c1d6c

    SHA1

    69631de7891162dd4840112a251f6531feae7509

    SHA256

    ce174412cb2889bbf162b7ebe4476da5a9c928ba5b13111d338753ccc4c0f5fd

    SHA512

    c9cae8bcc14661e993d97a3c7b658310a8b9c19044817589f92eab66f1bcfcecb3468b0de8b45cd68e218c23cd9c60aeef1d391af36ec03afab5c8b86d7937d4

  • C:\Users\Admin\AppData\Local\Temp\vbc2282817D633A42CCB3251520125F8AB6.TMP

    Filesize

    5KB

    MD5

    2f97904377030e246bb29672a31d9284

    SHA1

    b6d7146677a932a0bd1f666c7a1f98f5483ce1f9

    SHA256

    7e033003d0713f544de1f18b88b1f5a7a284a13083eb89e7ce1fe817c9bb159f

    SHA512

    ddf2c3a3ec60bed63e9f70a4a5969b1647b1061c6ff59d3b863771c8185904d3937d1f8227f0e87572329060300096a481d61e8dc3207df6fe0568da37289f54

  • C:\Users\Admin\AppData\Local\Temp\vbc25C2A2CD15E6440B8EF1D85FFCC410D8.TMP

    Filesize

    5KB

    MD5

    5fb831248c686023c8b35fa6aa5f199c

    SHA1

    39760507c72d11c33351b306e40decaad7eb2757

    SHA256

    d062acbeea69acb031b014cff19bed988cf9df34c230ee23d494457461b41908

    SHA512

    2244f84bff19e1f43a245569d03712ab62a9655bc6f3eb4ae78ca3472ddfc6ad7950dc76d10cdc1c7b2235a9045582554c200e93c3cd34c18e494ed60dd3b3ea

  • C:\Users\Admin\AppData\Local\Temp\vbc853F43D29F3541AA8283DEE7FCA95C1.TMP

    Filesize

    5KB

    MD5

    d01de1982af437cbba3924f404c7b440

    SHA1

    ccbd4d8726966ec77be4dbe1271f7445d4f9b0ce

    SHA256

    518d9922618db6eea409cee46b85252f0d060b45c2f896cb82eeca22eb715598

    SHA512

    a219cd3df17bcf16cb57bdeea804e206a60be50084e2cb99d6d5e77d88957d79535d110b34735a4b549d3fcae528cdff8bfa5286582028ef22e8b4d60e146878

  • C:\Users\Admin\AppData\Local\Temp\vbcB49944DE431E4E07BF7F9DA9578519B6.TMP

    Filesize

    5KB

    MD5

    2f824fea57844a415b42a3a0551e5a5a

    SHA1

    0e0a792d5707c1d2e3194c59b9ed0b3db5ce9da4

    SHA256

    803a596fd573096225dd07568b8b459d2fbbfce03fa60ca69d05d7d92b64c5ee

    SHA512

    7ec7ea88364f2e18747192ac2913f326a6ebb19c64be4ae9fc4f811d31deb5dc3b0b83d46814ddb836b36ac57e70c9b63be0cc4c84e6e958acf2512c57877008

  • C:\Users\Admin\AppData\Local\Temp\vbcB7E7C704F585420BBD9184E46FC7FB37.TMP

    Filesize

    5KB

    MD5

    249d49f34404bfbe7ed958880be39f61

    SHA1

    51ec83fb9190df984bf73f2c5cd1edc0edf1882a

    SHA256

    fcb5a4d24f24fbeaf4dc9d8e29f2701b2bb71411acb13c4fa67fe7025892912b

    SHA512

    082f47f59b9184dd6c88f64214e10b82656a09c5a5cf3f0eccbf7935505db473eeb9a395cb5b59ec5009e731f2aa1891670c94ff6315a0b2d4fcc0392cff0e98

  • C:\Users\Admin\AppData\Local\Temp\vbcC40C534086154A7E9D38B56B9BC583B.TMP

    Filesize

    5KB

    MD5

    852ad787d5b62a59d1a85e31224eb42e

    SHA1

    3f9125530ba96a8d00a2acd6650bd952efbcbfc4

    SHA256

    5c0fea62e1b6f98b0a2fe87cdb1569ca9c8836cefd8c14d351f95a08ebb4aa46

    SHA512

    71737f2f3a7b86c54b465aa36d27b42844693b113d207726ba24a4d3c803ba93094d7417d4eea7a0f3f5e5d5f5a74cc34694c5706690287e7b575ad0819be560

  • C:\Users\Admin\AppData\Local\Temp\vbcDAF24A696CFB4F7BBBF7C46B6F27E2DA.TMP

    Filesize

    5KB

    MD5

    3354a8aea8f4e2ef2971801783ef2041

    SHA1

    dc1cf8cabbe99ceb2865d28dad42a26f348928a4

    SHA256

    786c605582daeb4e1aa938ac767ae2c65568d460aa3f75c405c9ae6f0daa98b0

    SHA512

    1948c466215121a821864410f74553bf4c765763532c07c522c71d7b91e3148c21d26adafcf893d5e1cd81e138c35608ef7e3cd9072e74d6768e46a94411355f

  • C:\Users\Admin\AppData\Local\Temp\vbcE86687C8CDD1499ABA163D39289AD52.TMP

    Filesize

    5KB

    MD5

    0534350659e80f4ec327247e33318612

    SHA1

    3ef80ddb7cb63d08a55b591fe6a0dff38d5d8623

    SHA256

    31fbacb6c44df54110e9f62b86a3607cc88a1fcedae4375cd7f3fa749c352311

    SHA512

    0424c2b9f5f7f9a0f97538729631e255679e4dd129b70b5cfb9eaf49b6f1583586e5147586eea04307e05275cd8511837a9adcf52c35bd86cc7cfca2d2d90301

  • C:\Users\Admin\AppData\Local\Temp\vbcED14B3CB7584A54999D4882726658B.TMP

    Filesize

    5KB

    MD5

    d56475192804e49bf9410d1a5cbd6c69

    SHA1

    215ecb60dc9a38d5307acb8641fa0adc52fea96c

    SHA256

    235e01afd8b5ad0f05911689146c2a0def9b73082998ac02fd8459682f409eee

    SHA512

    03338d75dd54d3920627bd4cb842c8c3fefad3c8130e1eeb0fa73b6c31b536b3d917e84578828219b4ffd2e93e1775c163b69d74708e4a8894dd437db5e22e51

  • C:\Users\Admin\AppData\Local\Temp\wzga79zk.0.vb

    Filesize

    376B

    MD5

    688ef599a13c30230d9c00287511e084

    SHA1

    496834103ac52660dd8554590a2f92cbda8ab759

    SHA256

    9ce0d8e22177e91d78bf3e578b8b5f0d22d724ae17931195de2e3b5b46255051

    SHA512

    0f244536f83308c7db23337dadcef882fd258954d7e3c8a5f3f66ee0861fec0cd6ea7b3310db65a306de380da410af1e8e4041fabbc917b6af4b94d9424cec8b

  • C:\Users\Admin\AppData\Local\Temp\wzga79zk.cmdline

    Filesize

    267B

    MD5

    10d290a2e08d4cf2d87c7b3969900b07

    SHA1

    7b727eb87240206852f288f2e76ccd29ad48d45e

    SHA256

    f56684d6dcf876208f4f3da17ebd50b5529d3e171e2d8781e949d10cf3c93f75

    SHA512

    7fa6499e05f8df6f73c4454ce157c3cc83f696838d7fdb54adee7e4d3582a07d85923505f63b300d913bc55014306261590b367782c700e80fdd19183700794c

  • C:\Users\Admin\AppData\Local\Temp\z_rt6beb.0.vb

    Filesize

    373B

    MD5

    7d0d85a69a8fba72e1185ca194515983

    SHA1

    8bd465fb970b785aa87d7edfa11dbff92c1b4af6

    SHA256

    9f78b435099106c2c3486c5db352f7d126b3532c1b4e8fe34ef8931c7b8968d5

    SHA512

    e5ef339dc329dbba2ab06678a9e504aa594d2f21ade45e49bccd83a44a76dc657f5f44dcf368f4d112bb3b01af2e577a487c6078751943770e90780fad202989

  • C:\Users\Admin\AppData\Local\Temp\z_rt6beb.cmdline

    Filesize

    261B

    MD5

    7019eddaa0f4e1f75c78f57bc5a2d591

    SHA1

    e632a4bc1298efabd520e0f61d920b0b1abd7bfe

    SHA256

    9cf0ea9a925bdc1facfc65ce3d9a5396e0f10336a1c99f7a3c66f9eb78b4a1b1

    SHA512

    29adf649178b94c6d3e2eaea9d453abffd77502a7c47d0508869b4c2a61f68c057a4c4e69ea5d3a0bdc9b5e61b2cee30f63c49ec4ae24d68be7aef746509e0d7

  • memory/2256-13-0x00007FF8BCDA0000-0x00007FF8BD741000-memory.dmp

    Filesize

    9.6MB

  • memory/2256-1-0x00007FF8BCDA0000-0x00007FF8BD741000-memory.dmp

    Filesize

    9.6MB

  • memory/2256-0-0x00007FF8BD055000-0x00007FF8BD056000-memory.dmp

    Filesize

    4KB

  • memory/2256-4-0x000000001C6D0000-0x000000001C732000-memory.dmp

    Filesize

    392KB

  • memory/2256-3-0x000000001C560000-0x000000001C606000-memory.dmp

    Filesize

    664KB

  • memory/2256-7-0x00007FF8BCDA0000-0x00007FF8BD741000-memory.dmp

    Filesize

    9.6MB

  • memory/2256-2-0x000000001C090000-0x000000001C55E000-memory.dmp

    Filesize

    4.8MB

  • memory/3080-16-0x0000000075410000-0x00000000759C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3080-11-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3080-14-0x0000000075410000-0x00000000759C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3080-17-0x0000000075410000-0x00000000759C1000-memory.dmp

    Filesize

    5.7MB

  • memory/3080-20-0x0000000075410000-0x00000000759C1000-memory.dmp

    Filesize

    5.7MB

  • memory/4716-18-0x0000000075412000-0x0000000075413000-memory.dmp

    Filesize

    4KB

  • memory/4716-6-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4716-8-0x0000000075412000-0x0000000075413000-memory.dmp

    Filesize

    4KB

  • memory/4716-9-0x0000000075410000-0x00000000759C1000-memory.dmp

    Filesize

    5.7MB

  • memory/4716-10-0x0000000075410000-0x00000000759C1000-memory.dmp

    Filesize

    5.7MB

  • memory/4716-19-0x0000000075410000-0x00000000759C1000-memory.dmp

    Filesize

    5.7MB