Analysis

  • max time kernel
    1524s
  • max time network
    1799s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-11-2020 17:21

General

  • Target

    Downloads.exe

  • Size

    163MB

  • MD5

    2e5f0d7f3b1505978fa81cf1e70d02d5

  • SHA1

    99a6086d8a23ea12aba3a8ddd7f67c427981622f

  • SHA256

    8701918235296129f184663d445f30d9235911a79a5aa8d0999c6467190bae51

  • SHA512

    9239b684c9d2a0583a01c7f27d9fa76a271bc729645e3b222f02d6dffdec347cfef706c5a79aafb97f251bb2c92fde25583f004dd583640e8d9eb8d1b2e7441f

Malware Config

Extracted

Credentials

  • Protocol:
    ftp
  • Host:
    45.141.184.35
  • Port:
    21
  • Username:
    alex
  • Password:
    easypassword

Extracted

Family

revengerat

Botnet

YT

C2

yukselofficial.duckdns.org:5552

Extracted

Family

revengerat

Botnet

system

C2

yj233.e1.luyouxia.net:20645

Extracted

Family

revengerat

Botnet

samay

C2

shnf-47787.portmap.io:47787

Extracted

Family

hawkeye_reborn

Version

10.1.2.2

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    mor440ney@yandex.com
  • Password:
    castor123@
Attributes
  • fields

    map[_AntiDebugger:false _AntiVirusKiller:false _BotKiller:false _ClipboardLogger:true _Delivery:0 _DisableCommandPrompt:false _DisableRegEdit:false _DisableTaskManager:false _Disablers:false _EmailPassword:castor123@ _EmailPort:587 _EmailSSL:true _EmailServer:smtp.yandex.com _EmailUsername:mor440ney@yandex.com _ExecutionDelay:10 _FTPPort:0 _FTPSFTP:false _FakeMessageIcon:0 _FakeMessageShow:false _FileBinder:false _HideFile:false _HistoryCleaner:false _Install:false _InstallLocation:0 _InstallStartup:false _InstallStartupPersistance:false _KeyStrokeLogger:true _LogInterval:10 _MeltFile:false _Mutex:245f77ec-c812-48df-870b-886d22992db6 _PasswordStealer:true _ProcessElevation:false _ProcessProtection:false _ScreenshotLogger:false _SystemInfo:false _Version:10.1.2.2 _WebCamLogger:false _WebsiteBlocker:false _WebsiteVisitor:false _WebsiteVisitorVisible:false _ZoneID:false]

  • name

    HawkEye Keylogger - RebornX, Version=10.1.2.2, Culture=neutral, PublicKeyToken=null

Extracted

Family

cobaltstrike

C2

http://47.91.237.42:8443/__utm.gif

Attributes
  • access_type

    512

  • beacon_type

    2048

  • create_remote_thread

    0

  • day

    0

  • dns_idle

    0

  • dns_sleep

    0

  • host

    47.91.237.42,/__utm.gif

  • http_header1

    AAAABwAAAAAAAAADAAAABgAAAAZDb29raWUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_header2

    AAAACgAAACZDb250ZW50LVR5cGU6IGFwcGxpY2F0aW9uL29jdGV0LXN0cmVhbQAAAAcAAAAAAAAABQAAAAJpZAAAAAcAAAABAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • http_method1

    GET

  • http_method2

    POST

  • injection_process

  • jitter

    0

  • maxdns

    255

  • month

    0

  • pipe_name

  • polling_time

    60000

  • port_number

    8443

  • proxy_password

  • proxy_server

  • proxy_username

  • sc_process32

    %windir%\syswow64\rundll32.exe

  • sc_process64

    %windir%\sysnative\rundll32.exe

  • state_machine

    MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDS7zRQv7EhhTkbgDrCNBsNay7lzQFmcC/GWwjOq93nKwPSszjIKgtW8nwhtoRhr6MFZx4DSYFdeuJDrtJNcTZz2C/LgZzhSQJmhiEqCkVqPPCfK1C6S4PzDrzy9L794rPLOuoewlGAXgiH5/Ae2aC5k2wedRNfes3DJZDDCaJJYwIDAQABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown1

    4096

  • unknown2

    AAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==

  • unknown3

    0

  • unknown4

    0

  • unknown5

    2.018915346e+09

  • uri

    /submit.php

  • user_agent

    Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; Trident/4.0)

  • year

    0

Extracted

Family

revengerat

Botnet

XDSDDD

C2

84.91.119.105:333

Extracted

Family

revengerat

Botnet

Victime

C2

cocohack.dtdns.net:84

Extracted

Family

zloader

Botnet

main

Campaign

26.02.2020

C2

https://airnaa.org/sound.php

https://banog.org/sound.php

https://rayonch.org/sound.php

rc4.plain

Extracted

Family

smokeloader

Version

2019

C2

http://advertserv25.world/logstatx77/

http://mailstatm74.club/logstatx77/

http://kxservx7zx.club/logstatx77/

http://dsmail977sx.xyz/logstatx77/

http://fdmail709.club/logstatx77/

http://servicestar751.club/logstatx77/

http://staradvert9075.club/logstatx77/

http://staradvert1883.club/logstatx77/

rc4.i32
rc4.i32

Extracted

Family

revengerat

Botnet

INSERT-COIN

C2

3.tcp.ngrok.io:24041

Extracted

Family

zloader

Botnet

07/04

C2

https://xyajbocpggsr.site/wp-config.php

https://ooygvpxrb.pw/wp-config.php

rc4.plain

Extracted

Family

zloader

Botnet

09/04

C2

https://eoieowo.casa/wp-config.php

https://dcgljuzrb.pw/wp-config.php

rc4.plain

Extracted

Family

zloader

Botnet

25/03

C2

https://wgyvjbse.pw/milagrecf.php

https://botiq.xyz/milagrecf.php

rc4.plain

Extracted

Family

formbook

Version

4.0

C2

http://www.worstig.com/w9z/

Decoy

crazzysex.com

hanferd.com

gteesrd.com

bayfrontbabyplace.com

jicuiquan.net

relationshiplink.net

ohchacyberphoto.com

kauegimenes.com

powerful-seldom.com

ketotoken.com

make-money-online-success.com

redgoldcollection.com

hannan-football.com

hamptondc.com

vllii.com

aa8520.com

platform35markethall.com

larozeimmo.com

oligopoly.net

llhak.info

Extracted

Family

gozi_rm3

Botnet

86920224

C2

https://sibelikinciel.xyz

Attributes
  • build

    300869

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Extracted

Family

emotet

Botnet

Epoch3

C2

71.57.180.213:80

185.86.148.68:443

168.235.82.183:8080

181.113.229.139:443

181.134.9.162:80

217.199.160.224:8080

105.209.235.113:8080

216.75.37.196:8080

97.104.107.190:80

203.153.216.182:7080

107.161.30.122:8080

41.106.96.12:80

202.5.47.71:80

201.235.10.215:80

105.213.67.88:80

115.79.195.246:80

179.5.118.12:80

212.112.113.235:80

139.59.12.63:8080

177.37.81.212:443

rsa_pubkey.plain

Extracted

Family

danabot

C2

92.204.160.54

2.56.213.179

45.153.186.47

93.115.21.29

185.45.193.50

193.34.166.247

rsa_pubkey.plain

Extracted

Family

smokeloader

Version

2017

C2

http://92.53.105.14/

Extracted

Family

qakbot

Botnet

spx129

Campaign

1590734339

C2

94.10.81.239:443

94.52.160.116:443

67.0.74.119:443

175.137.136.79:443

73.232.165.200:995

79.119.67.149:443

62.38.111.70:2222

108.58.9.238:993

216.110.249.252:2222

67.209.195.198:3389

84.247.55.190:443

96.37.137.42:443

94.176.220.76:2222

173.245.152.231:443

96.227.122.123:443

188.192.75.8:995

24.229.245.124:995

71.163.225.75:443

75.71.77.59:443

104.36.135.227:443

Extracted

Family

formbook

Version

4.1

C2

http://www.joomlas123.com/i0qi/

http://www.norjax.com/app/

Decoy

mytakeawaybox.com

goutaihuo.com

kuzey.site

uppertenpiercings.amsterdam

honeygrandpa.com

jenniferabramslaw.com

ncarian.com

heavilymeditatedhouston.com

gsbjyzx.com

akisanblog.com

taoyuanreed.com

jasperrvservices.com

yabbanet.com

myhealthfuldiet.com

flipdigitalcoins.com

toes.photos

shoottillyoumiss.com

maserental.com

smarteacher.net

hamdimagdeco.com

Extracted

Family

raccoon

Botnet

5e4db353b88c002ba6466c06437973619aad03b3

Attributes
  • url4cnc

    https://telete.in/brikitiki

rc4.plain
rc4.plain

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Extracted

Family

asyncrat

Version

0.5.7B

C2

agentttt.ac.ug:6970

agentpurple.ac.ug:6970

Attributes
  • aes_key

    16dw6EDbQkYZp5BTs7cmLUicVtOA4UQr

  • anti_detection

    false

  • autorun

    false

  • bdos

    false

  • delay

    Default

  • host

    agentttt.ac.ug,agentpurple.ac.ug

  • hwid

    3

  • install_file

  • install_folder

    %AppData%

  • mutex

    AsyncMutex_6SI8OkPnk

  • pastebin_config

    null

  • port

    6970

  • version

    0.5.7B

aes.plain

Extracted

Family

zloader

Botnet

CanadaLoads

Campaign

Nerino

C2

https://monanuslanus.com/bFnF0y1r/7QKpXmV3Pz.php

https://lericastrongs.com/bFnF0y1r/7QKpXmV3Pz.php

https://hyllionsudks.com/bFnF0y1r/7QKpXmV3Pz.php

https://crimewasddef.com/bFnF0y1r/7QKpXmV3Pz.php

https://derekdsingel.com/bFnF0y1r/7QKpXmV3Pz.php

https://simplereffiret.com/bFnF0y1r/7QKpXmV3Pz.php

https://regeerscomba.com/bFnF0y1r/7QKpXmV3Pz.php

rc4.plain
rsa_pubkey.plain

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Azorult

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

  • Cobaltstrike

    Detected malicious payload which is part of Cobaltstrike.

  • Contains code to disable Windows Defender ⋅ 4 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • CoreEntity .NET Packer ⋅ 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload ⋅ 1 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • HawkEye Reborn

    HawkEye Reborn is an enhanced version of the HawkEye malware kit.

  • M00nd3v_Logger

    M00nd3v Logger is a .NET stealer/logger targeting passwords from browsers and email clients.

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main Payload ⋅ 2 IoCs
  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • RMS

    Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

  • Raccoon

    Simple but powerful infostealer which was very active in 2019.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload ⋅ 1 IoCs
  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Zloader, Terdot, DELoader, ZeusSphinx

    Zloader is a malware strain that was initially discovered back in August 2015.

  • ACProtect 1.3x - 1.4x DLL software ⋅ 2 IoCs

    Detects file using ACProtect software.

  • AgentTesla Payload ⋅ 7 IoCs
  • Async RAT payload ⋅ 2 IoCs
  • CryptOne packer ⋅ 11 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Emotet Payload ⋅ 2 IoCs

    Detects Emotet payload in memory.

  • Formbook Payload ⋅ 12 IoCs
  • M00nD3v Logger Payload ⋅ 3 IoCs

    Detects M00nD3v Logger payload in memory.

  • ModiLoader First Stage ⋅ 1 IoCs
  • Nirsoft ⋅ 3 IoCs
  • ReZer0 packer ⋅ 4 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • RevengeRat Executable ⋅ 13 IoCs
  • ASPack v2.12-2.42 ⋅ 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE ⋅ 13 IoCs
  • UPX packed file ⋅ 19 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file ⋅ 2 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Loads dropped DLL ⋅ 1 IoCs
  • Obfuscated with Agile.Net obfuscator ⋅ 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Legitimate hosting services abused for malware hosting/C2 ⋅ 1 TTPs
  • Looks up external IP address via web service ⋅ 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext ⋅ 3 IoCs
  • Enumerates physical storage devices ⋅ 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer ⋅ 8 IoCs
  • Checks SCSI registry key(s) ⋅ 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry ⋅ 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class ⋅ 2 IoCs
  • Suspicious behavior: EnumeratesProcesses ⋅ 4 IoCs
  • Suspicious use of AdjustPrivilegeToken ⋅ 5 IoCs
  • Suspicious use of SetWindowsHookEx ⋅ 2 IoCs
  • Suspicious use of WriteProcessMemory ⋅ 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Downloads.exe
    "C:\Users\Admin\AppData\Local\Temp\Downloads.exe"
    Modifies registry class
    Suspicious use of SetWindowsHookEx
    PID:1144
  • C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010(1).exe
    "C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010(1).exe"
    Executes dropped EXE
    Suspicious use of SetThreadContext
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:1784
    • C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010(1).exe
      "{path}"
      Executes dropped EXE
      PID:936
    • C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010(1).exe
      "{path}"
      Executes dropped EXE
      PID:1732
  • C:\Users\Admin\Desktop\file(1).exe
    "C:\Users\Admin\Desktop\file(1).exe"
    Executes dropped EXE
    Suspicious use of AdjustPrivilegeToken
    PID:2692
  • C:\Users\Admin\Desktop\file.exe
    "C:\Users\Admin\Desktop\file.exe"
    Executes dropped EXE
    Suspicious use of AdjustPrivilegeToken
    PID:2836
  • C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010.exe
    "C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010.exe"
    Executes dropped EXE
    Suspicious use of SetThreadContext
    Suspicious behavior: EnumeratesProcesses
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\Desktop\hyundai steel-pipe- job 8010.exe
      "{path}"
      Executes dropped EXE
      PID:492
  • C:\Users\Admin\Desktop\KLwC6vii.exe
    "C:\Users\Admin\Desktop\KLwC6vii.exe"
    Executes dropped EXE
    Checks processor information in registry
    Suspicious use of AdjustPrivilegeToken
    PID:2524
  • C:\Users\Admin\Desktop\cobaltstrike_shellcode.exe
    "C:\Users\Admin\Desktop\cobaltstrike_shellcode.exe"
    Executes dropped EXE
    PID:740
  • C:\Users\Admin\Desktop\b2bd3de3e5b0e35313263bef4b1ca49c5478d472f6d37d1070a57b1f6aa4f7bb (2).exe
    "C:\Users\Admin\Desktop\b2bd3de3e5b0e35313263bef4b1ca49c5478d472f6d37d1070a57b1f6aa4f7bb (2).exe"
    Executes dropped EXE
    PID:3492
  • C:\Users\Admin\Desktop\2019-09-02_22-41-10.exe
    "C:\Users\Admin\Desktop\2019-09-02_22-41-10.exe"
    Executes dropped EXE
    Suspicious use of SetThreadContext
    Suspicious use of WriteProcessMemory
    PID:3984
    • C:\Users\Admin\Desktop\2019-09-02_22-41-10.exe
      "C:\Users\Admin\Desktop\2019-09-02_22-41-10.exe"
      Executes dropped EXE
      Loads dropped DLL
      Checks SCSI registry key(s)
      PID:804
  • C:\Users\Admin\Desktop\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe
    "C:\Users\Admin\Desktop\905d572f23883f5f161f920e53473989cf7dffc16643aa759f77842e54add550.exe"
    Executes dropped EXE
    PID:3828

Network

MITRE ATT&CK Matrix

Collection

    Command and Control

      Credential Access

        Defense Evasion

        Execution

          Exfiltration

            Impact

              Initial Access

                Lateral Movement

                  Persistence

                    Privilege Escalation

                      Replay Monitor

                      00:00 00:00

                      Downloads

                      • C:\$RECYCLE.BIN.exe
                      • C:\$RECYCLE.BIN\S-1-5-21-3341490333-719741536-2920803124-1000\desktop.ini
                      • C:\9ee5942f813426ba75ae8dd1dfc42d.exe
                      • C:\9ee5942f813426ba75ae8dd1dfc42d\ParameterInfo.xml
                      • C:\9ee5942f813426ba75ae8dd1dfc42d\graphics\save.ico
                      • C:\BOOTNXT.energy[potentialenergy@mail.ru]
                      • C:\BOOTNXT.energy[potentialenergy@mail.ru].exe
                      • C:\BOOTNXT.energy[potentialenergy@mail.ru].exe.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\BOOTSECT.BAK.energy[potentialenergy@mail.ru]
                      • C:\BOOTSECT.BAK.energy[potentialenergy@mail.ru].exe
                      • C:\Boot\BOOTSTAT.DAT.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\FILES ENCRYPTED.txt
                      • C:\HOW_TO_DECYPHER_FILES.txt.exe
                      • C:\PerfLogs.exe
                      • C:\Program Files (x86)\Nnf3d\systraytx4p.exe
                      • C:\Program Files (x86)\Nzzc\l2jydtxntmx.exe
                      • C:\Program Files (x86)\Nzzc\l2jydtxntmx.exe
                      • C:\Program Files (x86)\Vtln\user-z9l_r18.exe
                      • C:\Program Files\Common Files\System\iediagcmd.exe
                      • C:\ProgramData\Microsoft\Intel\R8.exe
                      • C:\ProgramData\Microsoft\Intel\R8.exe
                      • C:\ProgramData\Microsoft\Intel\taskhost.exe
                      • C:\ProgramData\Microsoft\Intel\taskhost.exe
                      • C:\ProgramData\Microsoft\Intel\wini.exe
                      • C:\ProgramData\Microsoft\Provisioning\{c8a326e4-f518-4f14-b543-97a57e1a975e}\Prov\RunTime\121__Connections_Cellular_Vodafone Fiji (Fiji)_i0$(__MVID)@WAP.provxml.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\Microsoft\Provisioning\{c8a326e4-f518-4f14-b543-97a57e1a975e}\Prov\RunTime\122__Connections_Cellular_Vodafone Fiji (Fiji)_i1$(__MVID)@WAP.provxml.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\Microsoft\Provisioning\{c8a326e4-f518-4f14-b543-97a57e1a975e}\customizations.xml.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
                      • C:\ProgramData\Package Cache\{CB0836EC-B072-368D-82B2-D3470BF95707}v12.0.40660\packages\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\cab1.cab.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\Package Cache\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}v11.0.61030\packages\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\Package Cache\{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}v14.21.27702\packages\vcRuntimeMinimum_amd64\cab1.cab.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\Package Cache\{F7CAC7DF-3524-4C2D-A7DB-E16140A3D5E6}v14.21.27702\packages\vcRuntimeMinimum_amd64\vc_runtimeMinimum_x64.msi.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\Package Cache\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\state.rsm.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\Package Cache\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\state.rsm.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\RDPWinst.exe
                      • C:\ProgramData\RDPWinst.exe
                      • C:\ProgramData\RealtekHD\taskhost.exe
                      • C:\ProgramData\RealtekHD\taskhostw.exe
                      • C:\ProgramData\RealtekHD\taskhostw.exe
                      • C:\ProgramData\RevengeRAT\BOOTNXT.energy[potentialenergy@mail.ico
                      • C:\ProgramData\RevengeRAT\BOOTSECT.BAK.energy[potentialenergy@mail.ico
                      • C:\ProgramData\RevengeRAT\bootmgr.ico
                      • C:\ProgramData\RevengeRAT\vcredist2010_x64.log-MSI_vc_red.msi.txt.energy[potentialenergy@mail.ico
                      • C:\ProgramData\RevengeRAT\vcredist2010_x64.log.html.energy[potentialenergy@mail.ico
                      • C:\ProgramData\RevengeRAT\vcredist2010_x64.log.html.energy[potentialenergy@mail.ru].exe.id-9170B412.[Bit_decrypt@protonmail.com].ico
                      • C:\ProgramData\RevengeRAT\vcredist2012_x64_0_vcRuntimeMinimum_x64.log.energy[potentialenergy@mail.ico
                      • C:\ProgramData\RevengeRAT\vcredist2012_x64_1_vcRuntimeAdditional_x64.log.energy[potentialenergy@mail.ico
                      • C:\ProgramData\RevengeRAT\vcredist2013_x64_000_vcRuntimeMinimum_x64.log.energy[potentialenergy@mail.ico
                      • C:\ProgramData\RevengeRAT\vcredist2013_x64_001_vcRuntimeAdditional_x64.log.energy[potentialenergy@mail.ico
                      • C:\ProgramData\Synaptics\Synaptics.exe
                      • C:\ProgramData\WindowsTask\system.exe
                        MD5

                        49e31c4bcd9f86ba897dc7e64176dc50

                        SHA1

                        cbf0134bd25fd631c3baae23b9e5c79dffef870a

                        SHA256

                        006c8ee1ba292e19b1ee6d74d2eb3f8ca8f2c5a9e51a12b37501ea658e10c641

                        SHA512

                        b1ffb2eb281bd773eecfbf6df1d92073cba3298749736c775a82974f80cc938ffcf281a9cfd6bb0f8aa9961f9ee92e9a641cddae4f9e141190fdc569a24b1d70

                      • C:\ProgramData\WindowsTask\update.exe
                        MD5

                        c830b8a074455cc0777ed5bc0bfd2678

                        SHA1

                        bff2a96c092f8c5620a4d4621343594cd8892615

                        SHA256

                        3567966f3f2aa2e44d42b4bd3adae3c5bb121296c1901f69547ad36cd0d0f5f9

                        SHA512

                        c90eb64fee3ab08b8f23fc8958fd7f69c1decbe4295d071d07dc427042e53796edf511e7d61600dcdb7d7429925135f42752e199785049134ac7c0dbbf15f541

                      • C:\ProgramData\Windows\install.vbs
                      • C:\ProgramData\Windows\reg1.reg
                      • C:\ProgramData\Windows\rutserv.exe
                        MD5

                        37a8802017a212bb7f5255abc7857969

                        SHA1

                        cb10c0d343c54538d12db8ed664d0a1fa35b6109

                        SHA256

                        1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                        SHA512

                        4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                      • C:\ProgramData\Windows\rutserv.exe
                        MD5

                        37a8802017a212bb7f5255abc7857969

                        SHA1

                        cb10c0d343c54538d12db8ed664d0a1fa35b6109

                        SHA256

                        1699b9b4fc1724f9b0918b57ca58c453829a3935efd89bd4e9fa66b5e9f2b8a6

                        SHA512

                        4e20141da8ea4499daf8be5cc41b664dc4229e9575765caf6dc5873d8d0a09f9e200988e1404e767d0415005876a4cf38d5737bd3e1b2c12c4a8fb28adb4f0a0

                      • C:\ProgramData\Windows\vp8decoder.dll
                        MD5

                        88318158527985702f61d169434a4940

                        SHA1

                        3cc751ba256b5727eb0713aad6f554ff1e7bca57

                        SHA256

                        4c04d7968a9fe9d9258968d3a722263334bbf5f8af972f206a71f17fa293aa74

                        SHA512

                        5d88562b6c6d2a5b14390512712819238cd838914f7c48a27f017827cb9b825c24ff05a30333427acec93cd836e8f04158b86d17e6ac3dd62c55b2e2ff4e2aff

                      • C:\ProgramData\Windows\vp8encoder.dll
                        MD5

                        6298c0af3d1d563834a218a9cc9f54bd

                        SHA1

                        0185cd591e454ed072e5a5077b25c612f6849dc9

                        SHA256

                        81af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172

                        SHA512

                        389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe

                      • C:\ProgramData\install\utorrent.exe
                        MD5

                        8590e82b692b429189d114dda535b6e8

                        SHA1

                        5d527ad806ac740e2e2769f149270be6a722e155

                        SHA256

                        af5d5c340c063e7f4a70bd55ce1634b910e5d43d59c1008b4ad38d2c52c8db7d

                        SHA512

                        0747d770a6e5cc1fcd0b3ed060eaaa37531c9483620253aec8fc8fb472435d14b235e10339e52a41a563a0bc9af4e109940a71bb4e08495563ef7c581e962fda

                      • C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft Office 16 Click-to-Run Extensibility Component.swidtag.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft Office 16 Click-to-Run Licensing Component.swidtag.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft Office 16 Click-to-Run Localization Component.swidtag.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag.energy[potentialenergy@mail.ru]
                      • C:\ProgramData\ucp\usc.exe
                      • C:\ProgramData\ucp\usc.exe
                      • C:\Programdata\RealtekHD\taskhostw.exe
                      • C:\Recovery.exe
                      • C:\RevengeRAT\system.exe
                      • C:\Tools.exe
                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1FC0448E6D3D5712272FAF5B90A70C5E
                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\572BF21E454637C9F000BE1AF9B1E1A9
                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1FC0448E6D3D5712272FAF5B90A70C5E
                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\572BF21E454637C9F000BE1AF9B1E1A9
                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\572BF21E454637C9F000BE1AF9B1E1A9
                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\svchost.exe.log
                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9.exe.log
                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9Y5IiqmKLp.exe.log
                      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\officeclicktorun.exe.db.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\winword.exe.db.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\AppBlue.png.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\KFMScanExclusionToast.png.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\alertIcon.png.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_16.db
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\thumbcache_48.db
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\InetCookies\13113231.cookie
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\InetCookies\NH74TUMY.cookie
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\AC\AppCache\3S7JUIIC\2\3AKm_5XelPvzJ4B54e7QbULJfl4.br[1].js.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Settings_{25e9a94a-1201-4dd4-9523-90028a3cacea}\0.0.filtertrie.intermediate.txt.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\Users\Admin\AppData\Local\Temp\-5g40eql.0.vb
                      • C:\Users\Admin\AppData\Local\Temp\-5g40eql.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\3gu_7raq.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\6JJz2pYMvI.exe
                      • C:\Users\Admin\AppData\Local\Temp\6JJz2pYMvI.exe
                      • C:\Users\Admin\AppData\Local\Temp\6yagwxlx.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\8ssb4c7p.0.vb
                      • C:\Users\Admin\AppData\Local\Temp\8ssb4c7p.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\9Y5IiqmKLp.exe
                      • C:\Users\Admin\AppData\Local\Temp\9Y5IiqmKLp.exe
                      • C:\Users\Admin\AppData\Local\Temp\B28C.tmp\Keygen.exe
                      • C:\Users\Admin\AppData\Local\Temp\B28C.tmp\ba1.hta
                      • C:\Users\Admin\AppData\Local\Temp\FF7A.tmp\FF7B.tmp\FF7C.bat
                        MD5

                        ba36077af307d88636545bc8f585d208

                        SHA1

                        eafa5626810541319c01f14674199ab1f38c110c

                        SHA256

                        bec099c24451b843d1b5331686d5f4a2beff7630d5cd88819446f288983bda10

                        SHA512

                        933c2e5de3bc180db447e6864d7f0fa01e796d065fcd8f3d714086f49ec2f3ae8964c94695959beacf07d5785b569fd4365b7e999502d4afa060f4b833b68d80

                      • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
                      • C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe
                      • C:\Users\Admin\AppData\Local\Temp\RES24D1.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES35EC.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES3CCF.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES3F42.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES4C91.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES58C2.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES5B79.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES5CAE.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES6617.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES6D38.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES7247.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES7CD1.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES7D93.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES8B6E.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RES9CB4.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RESA974.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RESC2E9.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RESD021.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RESFED2.tmp
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-3.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keygen-step-4.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX10\JOzWR.dat
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX10\key.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX11\askinstall21.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX11\askinstall21.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\keygen-pr.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\keygen-step-3.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\keygen-step-3.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\keygen-step-4.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\keygen-step-4.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\juppp.exe
                        MD5

                        4daaeeeba9222078c92a61b2dabbe1d3

                        SHA1

                        0efc3cf265a697995a318eb2ac1ea2854af4d4cd

                        SHA256

                        a3d1bbbae88dc886822c41503e47fb2d475160d81f99ab6621d60cfa59b3effd

                        SHA512

                        2f8b73a414f96a36b54ed703054fb2a43ea2799d21076a2be75b8c5e7b49245d9a836a9dc1b5413f08366927a4839d158aa8f2c8b3b7589b5f0639b5a807dde4

                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\key.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\lcx.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\lcx.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX2\version2.txt
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX3\key.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX3\potato.dat
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX4\002.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX4\jg2_2qua.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-pr.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-pr.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen-step-4.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX5\keygen.bat
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-3.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-3.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX6\keygen-step-4.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX8\Setup.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX8\Setup.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX8\hjjgaa.exe
                        MD5

                        7016ff8fcb9d9451139d7a7541512597

                        SHA1

                        bf20fea9aa80a94531c4c3af8549b3e32bcada77

                        SHA256

                        97d21bc11812933a88c45cec4bef20e346952fc4a4144c93b19a205d20420a57

                        SHA512

                        b1ceab00b09c6feb716658e19b3021a8fe2d79ff06888b94376652907931aa67a451bb775ed0fc53fbd661f8b3ecaf98b8304604c1341df4ef21e9feac035e99

                      • C:\Users\Admin\AppData\Local\Temp\RarSFX8\hjjgaa.exe
                        MD5

                        7016ff8fcb9d9451139d7a7541512597

                        SHA1

                        bf20fea9aa80a94531c4c3af8549b3e32bcada77

                        SHA256

                        97d21bc11812933a88c45cec4bef20e346952fc4a4144c93b19a205d20420a57

                        SHA512

                        b1ceab00b09c6feb716658e19b3021a8fe2d79ff06888b94376652907931aa67a451bb775ed0fc53fbd661f8b3ecaf98b8304604c1341df4ef21e9feac035e99

                      • C:\Users\Admin\AppData\Local\Temp\RarSFX8\id6.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX8\searzar\searzar.exe
                        MD5

                        5af346c85e6a347401ebd8798035df35

                        SHA1

                        036e6513eccaee195ba637e85683744a8dce09c0

                        SHA256

                        e7129b9545ead3dc009bcf40b5368eac467705889478cfac339cfa129631b87d

                        SHA512

                        117338b32f8610facf930748b4d916bb9cc90dba1c72f2059e52219726d19f8dc6314c46505e80e492104ac7b4e5222419036c8ceb9477da12fc9ce32fbdda77

                      • C:\Users\Admin\AppData\Local\Temp\RarSFX8\searzar\searzar.exe
                        MD5

                        5af346c85e6a347401ebd8798035df35

                        SHA1

                        036e6513eccaee195ba637e85683744a8dce09c0

                        SHA256

                        e7129b9545ead3dc009bcf40b5368eac467705889478cfac339cfa129631b87d

                        SHA512

                        117338b32f8610facf930748b4d916bb9cc90dba1c72f2059e52219726d19f8dc6314c46505e80e492104ac7b4e5222419036c8ceb9477da12fc9ce32fbdda77

                      • C:\Users\Admin\AppData\Local\Temp\RarSFX8\whhw.exe
                      • C:\Users\Admin\AppData\Local\Temp\RarSFX9\setup.upx.exe
                        MD5

                        7d72db8aaceccd5cab82e0f618ce9d81

                        SHA1

                        c690d1e3a90499ce1b63ee9388dfaec786751e1e

                        SHA256

                        a8374f4efacd0d4ace4f78a781baf7a1e0913edaceb8feddcb82d07b68a1bcab

                        SHA512

                        88ff9256d7bfe8d724e42f59be08e51e70244d546ac8ef6466864d2466e52aac5d84acb0ea552168701e5e1d1eceee0696a0e3a40de2d83ab720e0e69de0d6d2

                      • C:\Users\Admin\AppData\Local\Temp\RarSFX9\setup.upx.exe
                        MD5

                        7d72db8aaceccd5cab82e0f618ce9d81

                        SHA1

                        c690d1e3a90499ce1b63ee9388dfaec786751e1e

                        SHA256

                        a8374f4efacd0d4ace4f78a781baf7a1e0913edaceb8feddcb82d07b68a1bcab

                        SHA512

                        88ff9256d7bfe8d724e42f59be08e51e70244d546ac8ef6466864d2466e52aac5d84acb0ea552168701e5e1d1eceee0696a0e3a40de2d83ab720e0e69de0d6d2

                      • C:\Users\Admin\AppData\Local\Temp\ak-ueg2n.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\azchgftrq.exe
                      • C:\Users\Admin\AppData\Local\Temp\bweehfv4.0.vb
                      • C:\Users\Admin\AppData\Local\Temp\bweehfv4.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\crhvsp4k.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI53B3.txt.id-9170B412.[Bit_decrypt@protonmail.com].BOMBO
                      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                      • C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
                      • C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt
                      • C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt
                      • C:\Users\Admin\AppData\Local\Temp\fjgha23_fa.txt
                      • C:\Users\Admin\AppData\Local\Temp\homkmzg6.0.vb
                      • C:\Users\Admin\AppData\Local\Temp\homkmzg6.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\i5kngq91.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\is-0984V.tmp\Setup.tmp
                      • C:\Users\Admin\AppData\Local\Temp\is-0984V.tmp\Setup.tmp
                      • C:\Users\Admin\AppData\Local\Temp\jBUJhPPS5J.exe
                      • C:\Users\Admin\AppData\Local\Temp\jBUJhPPS5J.exe
                      • C:\Users\Admin\AppData\Local\Temp\jBUJhPPS5J.exe
                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                        MD5

                        7fee8223d6e4f82d6cd115a28f0b6d58

                        SHA1

                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                        SHA256

                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                        SHA512

                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                        MD5

                        7fee8223d6e4f82d6cd115a28f0b6d58

                        SHA1

                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                        SHA256

                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                        SHA512

                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                        MD5

                        a6279ec92ff948760ce53bba817d6a77

                        SHA1

                        5345505e12f9e4c6d569a226d50e71b5a572dce2

                        SHA256

                        8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                        SHA512

                        213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                        MD5

                        a6279ec92ff948760ce53bba817d6a77

                        SHA1

                        5345505e12f9e4c6d569a226d50e71b5a572dce2

                        SHA256

                        8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                        SHA512

                        213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                      • C:\Users\Admin\AppData\Local\Temp\jfiag3g_gg.exe
                        MD5

                        a6279ec92ff948760ce53bba817d6a77

                        SHA1

                        5345505e12f9e4c6d569a226d50e71b5a572dce2

                        SHA256

                        8b581869bf8944a8e0aa169adea2a4afe47434123da477132880aff6a5032181

                        SHA512

                        213cb374f1273c899e0c88a20c0101a7c28024ce5046a2e0d7898bd182d918288bb80367fea4454c437c057ff9ed4fffd42be48a13ca73653021a6d63e1cfa9c

                      • C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe
                        MD5

                        7fee8223d6e4f82d6cd115a28f0b6d58

                        SHA1

                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                        SHA256

                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                        SHA512

                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                      • C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe
                        MD5

                        7fee8223d6e4f82d6cd115a28f0b6d58

                        SHA1

                        1b89c25f25253df23426bd9ff6c9208f1202f58b

                        SHA256

                        a45317c374d54e322153afd73f0e90f1486638d77b7fd85746d091071bbecd59

                        SHA512

                        3ed900b83dd178637c2fd4e8444a899f17f12c4ec92a6f4de4fe544fe8d41b521c69b8f348343cb397d0e160f23e27429042d758b5fa5acac0bab5c3584bace4

                      • C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe
                        MD5

                        4d4c98eca32b14aeb074db34cd0881e4

                        SHA1

                        92f213d609bba05d41d6941652a88c44936663a4

                        SHA256

                        4182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f

                        SHA512

                        959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf

                      • C:\Users\Admin\AppData\Local\Temp\jfiag_gg.exe
                        MD5

                        4d4c98eca32b14aeb074db34cd0881e4

                        SHA1

                        92f213d609bba05d41d6941652a88c44936663a4

                        SHA256

                        4182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f

                        SHA512

                        959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf

                      • C:\Users\Admin\AppData\Local\Temp\lu4jaays.dll
                      • C:\Users\Admin\AppData\Local\Temp\lu4jaays.pdb
                      • C:\Users\Admin\AppData\Local\Temp\mg3jeYg5HL.exe
                      • C:\Users\Admin\AppData\Local\Temp\okc20tzq.0.vb
                      • C:\Users\Admin\AppData\Local\Temp\okc20tzq.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\ozchgftrq.exe
                      • C:\Users\Admin\AppData\Local\Temp\ozchgftrq.exe
                      • C:\Users\Admin\AppData\Local\Temp\s7fztdhs.cmdline
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt
                      • C:\Users\Admin\AppData\Local\Temp\tmp.txt</