Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 17:07

General

  • Target

    690845ff6dd92317baf11489c8f794bcd939bdfaab8f94d9be14c67281c77d1c.exe

  • Size

    323KB

  • MD5

    8ba74b6ce57fdae026b73382a6565781

  • SHA1

    8ad386a61811b60f886789498739265e54e67c95

  • SHA256

    690845ff6dd92317baf11489c8f794bcd939bdfaab8f94d9be14c67281c77d1c

  • SHA512

    6e87f46ab54f7ee91076e38d145f5b56cc5e90181afddd543cf0092aa3886d3bc6b94fa2aa6cb7784de0c082a979387c4078abb1655e0f78f24ec8ba221f5693

  • SSDEEP

    3072:xvaadgILQPN49s/8DnCDRCjYOJZqU0n2GidpEzeYVidn6LzyUu4YPZtkjc86:x1HLQV49s2YZMpBiidGMZtkjt

Malware Config

Extracted

Family

smokeloader

Version

2022

C2

http://potunulit.org/

http://hutnilior.net/

http://bulimu55t.net/

http://soryytlic4.net/

http://novanosa5org.org/

http://nuljjjnuli.org/

http://tolilolihul.net/

http://somatoka51hub.net/

http://hujukui3.net/

http://bukubuka1.net/

http://golilopaster.org/

http://newzelannd66.org/

http://otriluyttn.org/

rc4.i32
rc4.i32

Extracted

Family

djvu

C2

http://zexeq.com/test2/get.php

http://zexeq.com/lancer/get.php

Attributes
  • extension

    .nifr

  • offline_id

    FCP2fiITr4rryFhFBnA59GMgwES5CunmcbPc76t1

  • payload_url

    http://uaery.top/dl/build2.exe

    http://zexeq.com/files/1/build3.exe

  • ransomnote

    ATTENTION! Don't worry, you can return all your files! All your files like pictures, databases, documents and other important are encrypted with strongest encryption and unique key. The only method of recovering files is to purchase decrypt tool and unique key for you. This software will decrypt all your encrypted files. What guarantees you have? You can send one of your encrypted file from your PC and we decrypt it for free. But we can decrypt only 1 file for free. File must not contain valuable information. You can get and look video overview decrypt tool: https://we.tl/t-v8HcfXTy5x Price of private key and decrypt software is $980. Discount 50% available if you contact us first 72 hours, that's price for you is $490. Please note that you'll never restore your data without payment. Check your e-mail "Spam" or "Junk" folder if you don't get answer more than 6 hours. To get this software you need write on our e-mail: [email protected] Reserve e-mail address to contact us: [email protected] Your personal ID: 0679SUjhw

rsa_pubkey.plain

Extracted

Family

vidar

Version

3.2

Botnet

5df88deb5dde677ba658b77ad5f60248

C2

https://steamcommunity.com/profiles/76561199489580435

https://t.me/tabootalks

Attributes
  • profile_id_v2

    5df88deb5dde677ba658b77ad5f60248

  • user_agent

    Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.0.0 Safari/537.36 OPR/91.0.4516.79

Extracted

Family

smokeloader

Botnet

pub1

Extracted

Family

amadey

Version

3.65

C2

77.73.134.27/8bmdh3Slb2/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detected Djvu ransomware 33 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • SmokeLoader

    Modular backdoor trojan in use since 2014.

  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 29 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 7 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 9 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\690845ff6dd92317baf11489c8f794bcd939bdfaab8f94d9be14c67281c77d1c.exe
    "C:\Users\Admin\AppData\Local\Temp\690845ff6dd92317baf11489c8f794bcd939bdfaab8f94d9be14c67281c77d1c.exe"
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    PID:4484
  • C:\Users\Admin\AppData\Local\Temp\517B.exe
    C:\Users\Admin\AppData\Local\Temp\517B.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3908
    • C:\Users\Admin\AppData\Local\Temp\517B.exe
      C:\Users\Admin\AppData\Local\Temp\517B.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3696
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\8e843eff-de4c-4ef9-bc38-18fd964e2ac7" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:4568
      • C:\Users\Admin\AppData\Local\Temp\517B.exe
        "C:\Users\Admin\AppData\Local\Temp\517B.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:520
        • C:\Users\Admin\AppData\Local\Temp\517B.exe
          "C:\Users\Admin\AppData\Local\Temp\517B.exe" --Admin IsNotAutoStart IsNotTask
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3700
          • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build2.exe
            "C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build2.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:916
            • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build2.exe
              "C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build2.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Checks processor information in registry
              PID:3640
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 1884
                7⤵
                • Program crash
                PID:2572
          • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build3.exe
            "C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build3.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3008
            • C:\Windows\SysWOW64\schtasks.exe
              /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
              6⤵
              • Creates scheduled task(s)
              PID:2148
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3640 -ip 3640
    1⤵
      PID:2132
    • C:\Users\Admin\AppData\Local\Temp\DEA9.exe
      C:\Users\Admin\AppData\Local\Temp\DEA9.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Users\Admin\AppData\Local\Temp\DEA9.exe
        C:\Users\Admin\AppData\Local\Temp\DEA9.exe
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        PID:1288
        • C:\Users\Admin\AppData\Local\Temp\DEA9.exe
          "C:\Users\Admin\AppData\Local\Temp\DEA9.exe" --Admin IsNotAutoStart IsNotTask
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:3804
          • C:\Users\Admin\AppData\Local\Temp\DEA9.exe
            "C:\Users\Admin\AppData\Local\Temp\DEA9.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:1936
            • C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build2.exe
              "C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build2.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:4760
              • C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build2.exe
                "C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build2.exe"
                6⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                PID:3248
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c timeout /t 6 & del /f /q "C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build2.exe" & exit
                  7⤵
                    PID:3688
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 6
                      8⤵
                      • Delays execution with timeout.exe
                      PID:3156
              • C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build3.exe
                "C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build3.exe"
                5⤵
                • Executes dropped EXE
                PID:2688
                • C:\Windows\SysWOW64\schtasks.exe
                  /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                  6⤵
                  • Creates scheduled task(s)
                  PID:4192
      • C:\Users\Admin\AppData\Local\Temp\E07F.exe
        C:\Users\Admin\AppData\Local\Temp\E07F.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:3488
        • C:\Users\Admin\AppData\Local\Temp\E07F.exe
          C:\Users\Admin\AppData\Local\Temp\E07F.exe
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          PID:3796
          • C:\Users\Admin\AppData\Local\Temp\E07F.exe
            "C:\Users\Admin\AppData\Local\Temp\E07F.exe" --Admin IsNotAutoStart IsNotTask
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:4164
            • C:\Users\Admin\AppData\Local\Temp\E07F.exe
              "C:\Users\Admin\AppData\Local\Temp\E07F.exe" --Admin IsNotAutoStart IsNotTask
              4⤵
              • Executes dropped EXE
              PID:4564
      • C:\Users\Admin\AppData\Local\Temp\E448.exe
        C:\Users\Admin\AppData\Local\Temp\E448.exe
        1⤵
        • Executes dropped EXE
        • Checks SCSI registry key(s)
        • Suspicious behavior: MapViewOfSection
        PID:4348
      • C:\Users\Admin\AppData\Local\Temp\E63D.exe
        C:\Users\Admin\AppData\Local\Temp\E63D.exe
        1⤵
        • Executes dropped EXE
        PID:4008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4008 -s 340
          2⤵
          • Program crash
          PID:3156
      • C:\Users\Admin\AppData\Local\Temp\60B.exe
        C:\Users\Admin\AppData\Local\Temp\60B.exe
        1⤵
        • Checks computer location settings
        • Executes dropped EXE
        PID:5056
        • C:\Users\Admin\AppData\Local\Temp\Player3.exe
          "C:\Users\Admin\AppData\Local\Temp\Player3.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          PID:2940
          • C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe
            "C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:4160
        • C:\Users\Admin\AppData\Local\Temp\ss31.exe
          "C:\Users\Admin\AppData\Local\Temp\ss31.exe"
          2⤵
          • Executes dropped EXE
          PID:2952
        • C:\Users\Admin\AppData\Local\Temp\XandETC.exe
          "C:\Users\Admin\AppData\Local\Temp\XandETC.exe"
          2⤵
          • Executes dropped EXE
          PID:3168
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4008 -ip 4008
        1⤵
          PID:3928
        • C:\Users\Admin\AppData\Local\Temp\C17.exe
          C:\Users\Admin\AppData\Local\Temp\C17.exe
          1⤵
          • Executes dropped EXE
          PID:4312
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4312 -s 812
            2⤵
            • Program crash
            PID:4520
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4312 -ip 4312
          1⤵
            PID:2680
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN nbveek.exe /TR "C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe" /F
            1⤵
            • Creates scheduled task(s)
            PID:4896
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "nbveek.exe" /P "Admin:N"&&CACLS "nbveek.exe" /P "Admin:R" /E&&echo Y|CACLS "..\16de06bfb4" /P "Admin:N"&&CACLS "..\16de06bfb4" /P "Admin:R" /E&&Exit
            1⤵
              PID:116
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                2⤵
                  PID:3064
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "nbveek.exe" /P "Admin:N"
                  2⤵
                    PID:5108
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "nbveek.exe" /P "Admin:R" /E
                    2⤵
                      PID:2168
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      2⤵
                        PID:2000
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\16de06bfb4" /P "Admin:N"
                        2⤵
                          PID:2184
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\16de06bfb4" /P "Admin:R" /E
                          2⤵
                            PID:3772
                        • C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe
                          C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe
                          1⤵
                          • Executes dropped EXE
                          PID:3740
                        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                          1⤵
                          • Executes dropped EXE
                          PID:2940
                          • C:\Windows\SysWOW64\schtasks.exe
                            /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                            2⤵
                            • Creates scheduled task(s)
                            PID:644
                        • C:\Users\Admin\AppData\Roaming\tsuctij
                          C:\Users\Admin\AppData\Roaming\tsuctij
                          1⤵
                          • Executes dropped EXE
                          • Checks SCSI registry key(s)
                          PID:3744

                        Network

                        MITRE ATT&CK Enterprise v6

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\ProgramData\01657683710877454012783246

                          Filesize

                          112KB

                          MD5

                          780853cddeaee8de70f28a4b255a600b

                          SHA1

                          ad7a5da33f7ad12946153c497e990720b09005ed

                          SHA256

                          1055ff62de3dea7645c732583242adf4164bdcfb9dd37d9b35bbb9510d59b0a3

                          SHA512

                          e422863112084bb8d11c682482e780cd63c2f20c8e3a93ed3b9efd1b04d53eb5d3c8081851ca89b74d66f3d9ab48eb5f6c74550484f46e7c6e460a8250c9b1d8

                        • C:\ProgramData\76562677668389993189958590

                          Filesize

                          148KB

                          MD5

                          90a1d4b55edf36fa8b4cc6974ed7d4c4

                          SHA1

                          aba1b8d0e05421e7df5982899f626211c3c4b5c1

                          SHA256

                          7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

                          SHA512

                          ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

                        • C:\ProgramData\86384671366330700983992124

                          Filesize

                          124KB

                          MD5

                          9618e15b04a4ddb39ed6c496575f6f95

                          SHA1

                          1c28f8750e5555776b3c80b187c5d15a443a7412

                          SHA256

                          a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

                          SHA512

                          f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

                        • C:\ProgramData\90936809712808647227969412

                          Filesize

                          92KB

                          MD5

                          651d855bcf44adceccfd3fffcd32956d

                          SHA1

                          45ac6cb8bd69976f45a37bf86193bd4c8e03fce9

                          SHA256

                          4ada554163d26c8a3385d4fe372fc132971c867e23927a35d72a98aadb25b57b

                          SHA512

                          67b4683a4e780093e5b3e73ea906a42c74f96a9234845114e0ea6e61ab0308c2e5b7f12d3428ce5bf48928863c102f57c011f9cdc4589d2d82c078b3db70c31f

                        • C:\ProgramData\freebl3.dll

                          Filesize

                          669KB

                          MD5

                          550686c0ee48c386dfcb40199bd076ac

                          SHA1

                          ee5134da4d3efcb466081fb6197be5e12a5b22ab

                          SHA256

                          edd043f2005dbd5902fc421eabb9472a7266950c5cbaca34e2d590b17d12f5fa

                          SHA512

                          0b7f47af883b99f9fbdc08020446b58f2f3fa55292fd9bc78fc967dd35bdd8bd549802722de37668cc89ede61b20359190efbfdf026ae2bdc854f4740a54649e

                        • C:\ProgramData\mozglue.dll

                          Filesize

                          593KB

                          MD5

                          c8fd9be83bc728cc04beffafc2907fe9

                          SHA1

                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                          SHA256

                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                          SHA512

                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                        • C:\ProgramData\mozglue.dll

                          Filesize

                          593KB

                          MD5

                          c8fd9be83bc728cc04beffafc2907fe9

                          SHA1

                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                          SHA256

                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                          SHA512

                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                        • C:\ProgramData\mozglue.dll

                          Filesize

                          593KB

                          MD5

                          c8fd9be83bc728cc04beffafc2907fe9

                          SHA1

                          95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                          SHA256

                          ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                          SHA512

                          fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                        • C:\ProgramData\msvcp140.dll

                          Filesize

                          439KB

                          MD5

                          5ff1fca37c466d6723ec67be93b51442

                          SHA1

                          34cc4e158092083b13d67d6d2bc9e57b798a303b

                          SHA256

                          5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

                          SHA512

                          4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

                        • C:\ProgramData\nss3.dll

                          Filesize

                          2.0MB

                          MD5

                          1cc453cdf74f31e4d913ff9c10acdde2

                          SHA1

                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                          SHA256

                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                          SHA512

                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                        • C:\ProgramData\nss3.dll

                          Filesize

                          2.0MB

                          MD5

                          1cc453cdf74f31e4d913ff9c10acdde2

                          SHA1

                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                          SHA256

                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                          SHA512

                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                        • C:\ProgramData\nss3.dll

                          Filesize

                          2.0MB

                          MD5

                          1cc453cdf74f31e4d913ff9c10acdde2

                          SHA1

                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                          SHA256

                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                          SHA512

                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                        • C:\ProgramData\nss3.dll

                          Filesize

                          2.0MB

                          MD5

                          1cc453cdf74f31e4d913ff9c10acdde2

                          SHA1

                          6e85eae544d6e965f15fa5c39700fa7202f3aafe

                          SHA256

                          ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                          SHA512

                          dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                        • C:\ProgramData\softokn3.dll

                          Filesize

                          112KB

                          MD5

                          f61ba44ac31155865b6c3ea37baed463

                          SHA1

                          d640184db9ef513eef5d6d32c2afdf642b8644d9

                          SHA256

                          aa2b3d7fab2990d45da44aa3af546f4737ef6255083789c08e588bff986dd050

                          SHA512

                          fe74ebf81c1047f3bcca5996a850fea5b2593516c1c076b758d56a862980c24845a0727f983ab071660461d0aea7e62f027f719dd80a07428c012169903a43e4

                        • C:\ProgramData\vcruntime140.dll

                          MD5

                          d41d8cd98f00b204e9800998ecf8427e

                          SHA1

                          da39a3ee5e6b4b0d3255bfef95601890afd80709

                          SHA256

                          e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                          SHA512

                          cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                        • C:\SystemID\PersonalID.txt

                          Filesize

                          42B

                          MD5

                          7e3e9fcc42d297e9f68ca04b13a9fb44

                          SHA1

                          f263e27f040e44de2370f38499296e6dd25d84ff

                          SHA256

                          dbf4a18b623d921cef08c6a0959cc2a0d7df484ab0f208553363f901e5f6eed1

                          SHA512

                          8dd3e934d8e8acc72ac97f2d87bbda44da0cc78b48e358024840c8bf9fa3d6363b1ccbcd35f21a74a6f2474c681dc01d7c34e4d863212b1f52b5196273aa2cb5

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                          Filesize

                          2KB

                          MD5

                          b636591fc66c9d2a1a425dd29939147f

                          SHA1

                          0d48b7a8df06ce304c8a8b1c1dae5912c6b666f4

                          SHA256

                          95c629cd39afdd4a9e98a94b6ea6a85c3e692c27c77d963899177b55948b72d1

                          SHA512

                          e6be6c7ec5a010a3a3509a567891a0f338bf19e84649f5240e7e500cfc87c752cb28ca6a54aa93d896f4cdf2eac46775bf1165b0085eab23176b237d1bd9ad31

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                          Filesize

                          1KB

                          MD5

                          113f1cfd4e6a8d9ddf59d9f2209a71ef

                          SHA1

                          512da6cfe2a0513799764ddc68daba4c4893e1fa

                          SHA256

                          5ced92647584a33645223dd7fc28274d9321a27db1dce1191dfe0cd363100820

                          SHA512

                          5dcdbff46923d68aedb3409dcb3f1f32beefa863be29ed062457336aaa16907248c953d757e1c3124e6d298e124fe6994561c6595be10fe183f156824f9542fa

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\70C71DBB8B7D2BBCA12DF82826D851E0_278EAB15C57802B8465F5CA2986E9B30

                          Filesize

                          1KB

                          MD5

                          70e2810d03a40d2b78e9e5861900c622

                          SHA1

                          2b7286c72c3908f6a41e49dbd1b41f829bf151c2

                          SHA256

                          ced90d951f7bc1627370a77a821b836aa2a53f75a71a7bf9e47262f50f91cbd5

                          SHA512

                          3a819635dd290d2a3bba443f86ea269a0e56500151af38d60165fc496e9cbf99b252eebc1b92f2e3b35a24abec3639aa2586007e6f9595440d8a0e94d9202c21

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                          Filesize

                          1KB

                          MD5

                          6a3b8331e801f083b403b0857ed8d574

                          SHA1

                          48d275731f1dbd0630d1ca55a1b05f149a011d1f

                          SHA256

                          98651a2da4a4613bc2a03c4128926fe6b05f1af8a7a21e1fedec75db013706a0

                          SHA512

                          7527b8857707c8822e4b7f5049ddc9b4c49933e68535690746d84b7f0187a10f36e874719bdb1bf3ba8b035568a7cbafd687b80c4621dc35552d73f7e497071d

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                          Filesize

                          1KB

                          MD5

                          0a94282d52d192cf12df2c6feb4a29bd

                          SHA1

                          03210eab758ff86ab7adc1cfd0372a3d683bc299

                          SHA256

                          b94edcc12eaca90b60f221528e60ab6059f5ef16e81417e82643dbce160f6222

                          SHA512

                          202ede607a1d31c6ed5c2567da4e9339b4986785cedf5fe3e8f1fce689a25ccec4986a47b809f64fedc6be4593ac72106f19c6800bd6fb2fa92fa6323a56bdb9

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

                          Filesize

                          488B

                          MD5

                          697bac4707df14441ee539dccf0b5123

                          SHA1

                          5b915022e34bce9dccf357c4cebd9b3442ab70de

                          SHA256

                          55c03ed2be1af53ec76c1a66be14c4d7bb25fa48bc61a5b3b8c3c5ee3d0d2846

                          SHA512

                          b996e85187afc1d53a10f8c1dac52ca1c997ec05831a099b0591d4a889d0d251aac4e21ce3d1229628937588a00e791c7894e1c3c07bcc5bc7974b489b2a80f1

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771

                          Filesize

                          450B

                          MD5

                          7723a236bb69021ee5d2663c2ef7f184

                          SHA1

                          844642b444cff21f3f4fddec5fc74fa786eb7d01

                          SHA256

                          b714095f0088931915ca2895e6d80d283bfc5da5371688f3cd7faf890e00074b

                          SHA512

                          7755555e47cbd58837a0a370a527a16754d9da4fc9d6016cb9ecb6a76b8412f04e024c9823b1b7daf834c4057cb74fb4ee3d802aa045adfae7c19d1330046fe9

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\70C71DBB8B7D2BBCA12DF82826D851E0_278EAB15C57802B8465F5CA2986E9B30

                          Filesize

                          474B

                          MD5

                          abc76b322a4e0b66faf6d51f3d320b0d

                          SHA1

                          e64b512eb15ee944f9bd1f9666045000c0c2dcc6

                          SHA256

                          6e15f4ee5ebd4a67067148daf63e7dcf8ad0b546cf3c9e21384103a959c6391a

                          SHA512

                          da1596e63f3e31c7d7363309f5abf4b23a903ebad9339753d981c4721ea869d177cc8b6ef4059a93bb92cff28222ec9189891319d478ad691b6b376c227eb5e8

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

                          Filesize

                          482B

                          MD5

                          144440bd5a16e2f59aa6dba61afb9763

                          SHA1

                          56bdfbe9cd97010d629393ad696e1b9ebf1660d0

                          SHA256

                          221c5ccfe41e31a857267efe62263385549a616c21cc4cef731dc89c635a8a07

                          SHA512

                          cfb9916a3da1302c9c2478c326a010d29b1f474189b0070675a4a93067285ecdd7e4fa745f47912f12f48b62a4534c37443a2699cb58cd66bbc86522a0ae4c31

                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D

                          Filesize

                          458B

                          MD5

                          4aff0c3140989791627cda5b7b61f032

                          SHA1

                          4da765e07162fb5222929286c7120dd38c448049

                          SHA256

                          9b330a3fde7408be04cbdfc0d7082bb57a77349d8b65d7f4d3aa913d6292de7a

                          SHA512

                          cef5d5958139edab2d610eb6eaa1e92cbaa7568ca2b5355607fb7d205bb314d823c0cbc7ec70ffef7437a769ddef5ead50dcdc4be6cff789088043bc1f42c13d

                        • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build2.exe

                          Filesize

                          416KB

                          MD5

                          aa18968e6cfbdc382ada6a3ed2852085

                          SHA1

                          4a41fa1a182916d5790aa2071106b3441d64468d

                          SHA256

                          c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                          SHA512

                          8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                        • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build2.exe

                          Filesize

                          416KB

                          MD5

                          aa18968e6cfbdc382ada6a3ed2852085

                          SHA1

                          4a41fa1a182916d5790aa2071106b3441d64468d

                          SHA256

                          c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                          SHA512

                          8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                        • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build2.exe

                          Filesize

                          416KB

                          MD5

                          aa18968e6cfbdc382ada6a3ed2852085

                          SHA1

                          4a41fa1a182916d5790aa2071106b3441d64468d

                          SHA256

                          c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                          SHA512

                          8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                        • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build2.exe

                          Filesize

                          416KB

                          MD5

                          aa18968e6cfbdc382ada6a3ed2852085

                          SHA1

                          4a41fa1a182916d5790aa2071106b3441d64468d

                          SHA256

                          c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                          SHA512

                          8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                        • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build3.exe

                          Filesize

                          9KB

                          MD5

                          9ead10c08e72ae41921191f8db39bc16

                          SHA1

                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                          SHA256

                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                          SHA512

                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                        • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build3.exe

                          Filesize

                          9KB

                          MD5

                          9ead10c08e72ae41921191f8db39bc16

                          SHA1

                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                          SHA256

                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                          SHA512

                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                        • C:\Users\Admin\AppData\Local\22ea72c4-10a3-4f39-9586-81c761ea4734\build3.exe

                          Filesize

                          9KB

                          MD5

                          9ead10c08e72ae41921191f8db39bc16

                          SHA1

                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                          SHA256

                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                          SHA512

                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                        • C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build2.exe

                          Filesize

                          416KB

                          MD5

                          aa18968e6cfbdc382ada6a3ed2852085

                          SHA1

                          4a41fa1a182916d5790aa2071106b3441d64468d

                          SHA256

                          c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                          SHA512

                          8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                        • C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build2.exe

                          Filesize

                          416KB

                          MD5

                          aa18968e6cfbdc382ada6a3ed2852085

                          SHA1

                          4a41fa1a182916d5790aa2071106b3441d64468d

                          SHA256

                          c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                          SHA512

                          8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                        • C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build2.exe

                          Filesize

                          416KB

                          MD5

                          aa18968e6cfbdc382ada6a3ed2852085

                          SHA1

                          4a41fa1a182916d5790aa2071106b3441d64468d

                          SHA256

                          c165c8db38ef8dd8c33d103b5ee78e9ddafd8081ff0c7c035fa5251f970e6cfb

                          SHA512

                          8ffdacca2b003438fd4874e7c88beedb6ad8cf9cd5b36fda5907751e06a85a829e7d9ce7335fb59590462f78054722bccba511b21db838368c661d993000a845

                        • C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build3.exe

                          Filesize

                          9KB

                          MD5

                          9ead10c08e72ae41921191f8db39bc16

                          SHA1

                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                          SHA256

                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                          SHA512

                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                        • C:\Users\Admin\AppData\Local\531c7652-4de8-4f7a-b21f-36f2fcc4c104\build3.exe

                          Filesize

                          9KB

                          MD5

                          9ead10c08e72ae41921191f8db39bc16

                          SHA1

                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                          SHA256

                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                          SHA512

                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                        • C:\Users\Admin\AppData\Local\8e843eff-de4c-4ef9-bc38-18fd964e2ac7\517B.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe

                          Filesize

                          244KB

                          MD5

                          43a3e1c9723e124a9b495cd474a05dcb

                          SHA1

                          d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                          SHA256

                          619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                          SHA512

                          6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                        • C:\Users\Admin\AppData\Local\Temp\16de06bfb4\nbveek.exe

                          Filesize

                          244KB

                          MD5

                          43a3e1c9723e124a9b495cd474a05dcb

                          SHA1

                          d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                          SHA256

                          619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                          SHA512

                          6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                        • C:\Users\Admin\AppData\Local\Temp\517B.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\517B.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\517B.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\517B.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\517B.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\60B.exe

                          Filesize

                          4.4MB

                          MD5

                          bd1dadfb845c3b8018d40d1ba263d2f5

                          SHA1

                          cd6adcb27880e65b6e96ba5651f97a13cf96ffda

                          SHA256

                          c11341bd31f086ef5419859dab80b1cf3e880f33af2cb4ab69c2872790638404

                          SHA512

                          e40bfa15c291faec123b030eebc085fcf6a978f88d041dd24ddef91f5200db4690368863a1725b7c04d697518b8853e7346b69d137dab19a454fe0ebbf990cf6

                        • C:\Users\Admin\AppData\Local\Temp\60B.exe

                          Filesize

                          4.4MB

                          MD5

                          bd1dadfb845c3b8018d40d1ba263d2f5

                          SHA1

                          cd6adcb27880e65b6e96ba5651f97a13cf96ffda

                          SHA256

                          c11341bd31f086ef5419859dab80b1cf3e880f33af2cb4ab69c2872790638404

                          SHA512

                          e40bfa15c291faec123b030eebc085fcf6a978f88d041dd24ddef91f5200db4690368863a1725b7c04d697518b8853e7346b69d137dab19a454fe0ebbf990cf6

                        • C:\Users\Admin\AppData\Local\Temp\805025096232

                          Filesize

                          79KB

                          MD5

                          19a49d393620516d8b10d79a9d73202b

                          SHA1

                          a9bfd02648e828a40162cee256877483374fe0dc

                          SHA256

                          39cac49a88feef2203aa270a45654fca7156d8133954d4377b84a1224df2336c

                          SHA512

                          1d0da8452e21faf3e765a7aff708fcdfa3694307a7278f73ff5afae93a4ecc289d369aa9e20de7ad7fc32a80d8df193ea48dd075f1e2d76db6c3b9ddc4fdd178

                        • C:\Users\Admin\AppData\Local\Temp\C17.exe

                          Filesize

                          4.4MB

                          MD5

                          bd1dadfb845c3b8018d40d1ba263d2f5

                          SHA1

                          cd6adcb27880e65b6e96ba5651f97a13cf96ffda

                          SHA256

                          c11341bd31f086ef5419859dab80b1cf3e880f33af2cb4ab69c2872790638404

                          SHA512

                          e40bfa15c291faec123b030eebc085fcf6a978f88d041dd24ddef91f5200db4690368863a1725b7c04d697518b8853e7346b69d137dab19a454fe0ebbf990cf6

                        • C:\Users\Admin\AppData\Local\Temp\C17.exe

                          Filesize

                          4.4MB

                          MD5

                          bd1dadfb845c3b8018d40d1ba263d2f5

                          SHA1

                          cd6adcb27880e65b6e96ba5651f97a13cf96ffda

                          SHA256

                          c11341bd31f086ef5419859dab80b1cf3e880f33af2cb4ab69c2872790638404

                          SHA512

                          e40bfa15c291faec123b030eebc085fcf6a978f88d041dd24ddef91f5200db4690368863a1725b7c04d697518b8853e7346b69d137dab19a454fe0ebbf990cf6

                        • C:\Users\Admin\AppData\Local\Temp\DEA9.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\DEA9.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\DEA9.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\DEA9.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\DEA9.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\DEA9.exe

                          Filesize

                          751KB

                          MD5

                          fb526c2ba6b776af2a654ee85ed6e1a7

                          SHA1

                          cb2b74527aef80811380290a58677a932de111b6

                          SHA256

                          36bedcdc1ec49c77de80be90ec4c0bfb976c00fe2525e29b05efd668420850ff

                          SHA512

                          26638efb87327b051dd3665793dd518cf2e2721cfed2b560d504a3da09e787a8ce09a576cb94efa58f7377679a74553d78a1f877bfddcc387eefaaa3d5a7a733

                        • C:\Users\Admin\AppData\Local\Temp\E07F.exe

                          Filesize

                          752KB

                          MD5

                          59aea7e2a390de589340e9d22fbd5ee5

                          SHA1

                          8d7fe3045c7ad1251497d2969e8395843fdab3e0

                          SHA256

                          8b22e5dfbb4dddf4882a2ff1a3111eef06310eaa8bbf468c00802b5a621bee15

                          SHA512

                          e22622802f8191189d75b01ba47d4d1e488c16a498fa1f0c58b5ec73a4271a8cdb00207101387113ed1d2c9900080672b8e683bcd381083eb42260ef89e3fcc1

                        • C:\Users\Admin\AppData\Local\Temp\E07F.exe

                          Filesize

                          752KB

                          MD5

                          59aea7e2a390de589340e9d22fbd5ee5

                          SHA1

                          8d7fe3045c7ad1251497d2969e8395843fdab3e0

                          SHA256

                          8b22e5dfbb4dddf4882a2ff1a3111eef06310eaa8bbf468c00802b5a621bee15

                          SHA512

                          e22622802f8191189d75b01ba47d4d1e488c16a498fa1f0c58b5ec73a4271a8cdb00207101387113ed1d2c9900080672b8e683bcd381083eb42260ef89e3fcc1

                        • C:\Users\Admin\AppData\Local\Temp\E07F.exe

                          Filesize

                          752KB

                          MD5

                          59aea7e2a390de589340e9d22fbd5ee5

                          SHA1

                          8d7fe3045c7ad1251497d2969e8395843fdab3e0

                          SHA256

                          8b22e5dfbb4dddf4882a2ff1a3111eef06310eaa8bbf468c00802b5a621bee15

                          SHA512

                          e22622802f8191189d75b01ba47d4d1e488c16a498fa1f0c58b5ec73a4271a8cdb00207101387113ed1d2c9900080672b8e683bcd381083eb42260ef89e3fcc1

                        • C:\Users\Admin\AppData\Local\Temp\E07F.exe

                          Filesize

                          752KB

                          MD5

                          59aea7e2a390de589340e9d22fbd5ee5

                          SHA1

                          8d7fe3045c7ad1251497d2969e8395843fdab3e0

                          SHA256

                          8b22e5dfbb4dddf4882a2ff1a3111eef06310eaa8bbf468c00802b5a621bee15

                          SHA512

                          e22622802f8191189d75b01ba47d4d1e488c16a498fa1f0c58b5ec73a4271a8cdb00207101387113ed1d2c9900080672b8e683bcd381083eb42260ef89e3fcc1

                        • C:\Users\Admin\AppData\Local\Temp\E07F.exe

                          Filesize

                          752KB

                          MD5

                          59aea7e2a390de589340e9d22fbd5ee5

                          SHA1

                          8d7fe3045c7ad1251497d2969e8395843fdab3e0

                          SHA256

                          8b22e5dfbb4dddf4882a2ff1a3111eef06310eaa8bbf468c00802b5a621bee15

                          SHA512

                          e22622802f8191189d75b01ba47d4d1e488c16a498fa1f0c58b5ec73a4271a8cdb00207101387113ed1d2c9900080672b8e683bcd381083eb42260ef89e3fcc1

                        • C:\Users\Admin\AppData\Local\Temp\E448.exe

                          Filesize

                          323KB

                          MD5

                          5a843afca3b7e6753854e25bf19a6860

                          SHA1

                          876fea80b1e638a82c164dbeb49213d38107c55d

                          SHA256

                          35948cfd3fddb132d6592ec5c82c3740f8dd21cda2e5d46f6aaa82019c96fc69

                          SHA512

                          c158ffe5dec2fee61e9e99ea7156a9d0ccabf1fa70f76d8c9f188b25f1b4fc1567c741ae84b01df7ce32c3eaac6d4dc4e7ca2dba06c0423972f0ae6b47e69d4a

                        • C:\Users\Admin\AppData\Local\Temp\E448.exe

                          Filesize

                          323KB

                          MD5

                          5a843afca3b7e6753854e25bf19a6860

                          SHA1

                          876fea80b1e638a82c164dbeb49213d38107c55d

                          SHA256

                          35948cfd3fddb132d6592ec5c82c3740f8dd21cda2e5d46f6aaa82019c96fc69

                          SHA512

                          c158ffe5dec2fee61e9e99ea7156a9d0ccabf1fa70f76d8c9f188b25f1b4fc1567c741ae84b01df7ce32c3eaac6d4dc4e7ca2dba06c0423972f0ae6b47e69d4a

                        • C:\Users\Admin\AppData\Local\Temp\E63D.exe

                          Filesize

                          323KB

                          MD5

                          410e381e998774c749bb614c6fe3f84a

                          SHA1

                          e3b26966069b75ded5590ed268d14a1f194f0944

                          SHA256

                          b6c25f778c395197bd377b31135597a05f9a1dae9c5e4a373ee9ee14d44a1f20

                          SHA512

                          e9d84fea4dc7326e1262942ef8b69f0d251442b94101559937c3f537ced670e0927162bfc00dbc5af96aa5cf3d25e4162626cb0d872c4f6c88f82265e8599a3a

                        • C:\Users\Admin\AppData\Local\Temp\E63D.exe

                          Filesize

                          323KB

                          MD5

                          410e381e998774c749bb614c6fe3f84a

                          SHA1

                          e3b26966069b75ded5590ed268d14a1f194f0944

                          SHA256

                          b6c25f778c395197bd377b31135597a05f9a1dae9c5e4a373ee9ee14d44a1f20

                          SHA512

                          e9d84fea4dc7326e1262942ef8b69f0d251442b94101559937c3f537ced670e0927162bfc00dbc5af96aa5cf3d25e4162626cb0d872c4f6c88f82265e8599a3a

                        • C:\Users\Admin\AppData\Local\Temp\Player3.exe

                          Filesize

                          244KB

                          MD5

                          43a3e1c9723e124a9b495cd474a05dcb

                          SHA1

                          d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                          SHA256

                          619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                          SHA512

                          6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                        • C:\Users\Admin\AppData\Local\Temp\Player3.exe

                          Filesize

                          244KB

                          MD5

                          43a3e1c9723e124a9b495cd474a05dcb

                          SHA1

                          d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                          SHA256

                          619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                          SHA512

                          6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                        • C:\Users\Admin\AppData\Local\Temp\Player3.exe

                          Filesize

                          244KB

                          MD5

                          43a3e1c9723e124a9b495cd474a05dcb

                          SHA1

                          d293f427eaa8efc18bb8929a9f54fb61e03bdd89

                          SHA256

                          619bbbc9e9ddd1f6b7961cacb33d99c8f558499a33751b28d91085aab8cb95ab

                          SHA512

                          6717d6be0f25d66ba3689b703b9f1360c172138faa0172168c531f55eb217050c03a41396b7a440e899974d71c2f42b41d07db0ef97751c420facfae1550bfa7

                        • C:\Users\Admin\AppData\Local\Temp\XandETC.exe

                          Filesize

                          3.7MB

                          MD5

                          3006b49f3a30a80bb85074c279acc7df

                          SHA1

                          728a7a867d13ad0034c29283939d94f0df6c19df

                          SHA256

                          f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                          SHA512

                          e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                        • C:\Users\Admin\AppData\Local\Temp\XandETC.exe

                          Filesize

                          3.7MB

                          MD5

                          3006b49f3a30a80bb85074c279acc7df

                          SHA1

                          728a7a867d13ad0034c29283939d94f0df6c19df

                          SHA256

                          f283b4c0ad4a902e1cb64201742ca4c5118f275e7b911a7dafda1ef01b825280

                          SHA512

                          e8fc5791892d7f08af5a33462a11d39d29b5e86a62cbf135b12e71f2fcaaa48d40d5e3238f64e17a2f126bcfb9d70553a02d30dc60a89f1089b2c1e7465105dd

                        • C:\Users\Admin\AppData\Local\Temp\ss31.exe

                          Filesize

                          417KB

                          MD5

                          70336369523d7426108c4bf0cfad3845

                          SHA1

                          902555b8c820df6c10d91599674af6b3123f9981

                          SHA256

                          b14e0e157b905ca0b38eb97543a72959d8308fa649d37510d5e94c7b624a696b

                          SHA512

                          9835440da55d4bd8c266d2964b08bf6b897ffc60f8d559e557560504a970aa02737fa5318c62a4a4ca1ca7b8571933c28cd09e74aec25104b408046617316945

                        • C:\Users\Admin\AppData\Local\Temp\ss31.exe

                          Filesize

                          417KB

                          MD5

                          70336369523d7426108c4bf0cfad3845

                          SHA1

                          902555b8c820df6c10d91599674af6b3123f9981

                          SHA256

                          b14e0e157b905ca0b38eb97543a72959d8308fa649d37510d5e94c7b624a696b

                          SHA512

                          9835440da55d4bd8c266d2964b08bf6b897ffc60f8d559e557560504a970aa02737fa5318c62a4a4ca1ca7b8571933c28cd09e74aec25104b408046617316945

                        • C:\Users\Admin\AppData\Local\Temp\ss31.exe

                          Filesize

                          417KB

                          MD5

                          70336369523d7426108c4bf0cfad3845

                          SHA1

                          902555b8c820df6c10d91599674af6b3123f9981

                          SHA256

                          b14e0e157b905ca0b38eb97543a72959d8308fa649d37510d5e94c7b624a696b

                          SHA512

                          9835440da55d4bd8c266d2964b08bf6b897ffc60f8d559e557560504a970aa02737fa5318c62a4a4ca1ca7b8571933c28cd09e74aec25104b408046617316945

                        • C:\Users\Admin\AppData\Local\bowsakkdestx.txt

                          Filesize

                          559B

                          MD5

                          26f46db1233de6727079d7a2a95ea4b6

                          SHA1

                          5e0535394a608411c1a1c6cb1d5b4d6b52e1364d

                          SHA256

                          fb1b78c5bdcfedc3c928847a89411870bfd5b69c3c0054db272c84b8d282cdab

                          SHA512

                          81cf0bdf4215aa51c93ec0a581d2a35eda53f3d496b9dc4d6c720512b13301639d97bccd5a13570786301b552185a1afab2ea88606a2d536e6895024eaea1b4b

                        • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe

                          Filesize

                          9KB

                          MD5

                          9ead10c08e72ae41921191f8db39bc16

                          SHA1

                          abe3bce01cd34afc88e2c838173f8c2bd0090ae1

                          SHA256

                          8d7f0e6b6877bdfb9f4531afafd0451f7d17f0ac24e2f2427e9b4ecc5452b9f0

                          SHA512

                          aa35dbc59a3589df2763e76a495ce5a9e62196628b4c1d098add38bd7f27c49edf93a66fb8507fb746e37ee32932da2460e440f241abe1a5a279abcc1e5ffe4a

                        • memory/916-201-0x0000000002D10000-0x0000000002D67000-memory.dmp

                          Filesize

                          348KB

                        • memory/1288-326-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1288-312-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1288-310-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1288-309-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1936-393-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1936-347-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1936-553-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/1936-348-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2952-440-0x0000000002F90000-0x0000000003103000-memory.dmp

                          Filesize

                          1.4MB

                        • memory/2952-555-0x0000000003110000-0x0000000003244000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/2952-441-0x0000000003110000-0x0000000003244000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3184-135-0x00000000009B0000-0x00000000009C6000-memory.dmp

                          Filesize

                          88KB

                        • memory/3248-452-0x0000000000400000-0x000000000046C000-memory.dmp

                          Filesize

                          432KB

                        • memory/3248-558-0x0000000000400000-0x000000000046C000-memory.dmp

                          Filesize

                          432KB

                        • memory/3488-321-0x00000000025F0000-0x000000000270B000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/3640-224-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                          Filesize

                          972KB

                        • memory/3640-197-0x0000000000400000-0x000000000046C000-memory.dmp

                          Filesize

                          432KB

                        • memory/3640-292-0x0000000000400000-0x000000000046C000-memory.dmp

                          Filesize

                          432KB

                        • memory/3640-299-0x0000000000400000-0x000000000046C000-memory.dmp

                          Filesize

                          432KB

                        • memory/3640-202-0x0000000000400000-0x000000000046C000-memory.dmp

                          Filesize

                          432KB

                        • memory/3640-293-0x0000000000400000-0x000000000046C000-memory.dmp

                          Filesize

                          432KB

                        • memory/3640-200-0x0000000000400000-0x000000000046C000-memory.dmp

                          Filesize

                          432KB

                        • memory/3640-199-0x0000000000400000-0x000000000046C000-memory.dmp

                          Filesize

                          432KB

                        • memory/3696-147-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3696-149-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3696-151-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3696-158-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3696-162-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-181-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-211-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-183-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-182-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-184-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-179-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-175-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-174-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-169-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-168-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3700-167-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3796-329-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3796-319-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3796-320-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3796-317-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3796-330-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/3908-150-0x0000000002580000-0x000000000269B000-memory.dmp

                          Filesize

                          1.1MB

                        • memory/4348-338-0x0000000000920000-0x0000000000929000-memory.dmp

                          Filesize

                          36KB

                        • memory/4484-136-0x0000000000400000-0x0000000000806000-memory.dmp

                          Filesize

                          4.0MB

                        • memory/4484-134-0x0000000002540000-0x0000000002549000-memory.dmp

                          Filesize

                          36KB

                        • memory/4564-398-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/4564-554-0x0000000000400000-0x0000000000537000-memory.dmp

                          Filesize

                          1.2MB

                        • memory/5056-341-0x0000000000C60000-0x00000000010C4000-memory.dmp

                          Filesize

                          4.4MB