Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    240s
  • max time network
    587s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 21:28

General

  • Target

    http://temp.sh/whzOx/trash_malware.zip

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Possible privilege escalation attempt 6 IoCs
  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 25 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies file permissions 1 TTPs 6 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 30 IoCs
  • Drops file in Windows directory 18 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 34 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 4 IoCs
  • Checks SCSI registry key(s) 3 TTPs 36 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 2 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 23 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "http://temp.sh/whzOx/trash_malware.zip"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url http://temp.sh/whzOx/trash_malware.zip
      2⤵
      • Checks processor information in registry
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3692
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2024 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 27434 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {380a7e3e-b250-44a2-a39d-4a19980ec839} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" gpu
        3⤵
          PID:1100
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 28354 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ed52fb4-bda1-4f0b-ac4c-936dc7dbb321} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" socket
          3⤵
          • Checks processor information in registry
          PID:4416
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3004 -childID 1 -isForBrowser -prefsHandle 3012 -prefMapHandle 3212 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b27a888-3151-4af9-bba4-0148c4c10bea} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
          3⤵
            PID:4020
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3124 -childID 2 -isForBrowser -prefsHandle 3116 -prefMapHandle 2744 -prefsLen 32844 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3dbb8ca7-628f-4137-8e4a-4372654adaec} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
            3⤵
              PID:1868
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4468 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4288 -prefMapHandle 4388 -prefsLen 32844 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b5da9294-1364-46d1-971d-2f507fbf47bb} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" utility
              3⤵
              • Checks processor information in registry
              PID:4000
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 3 -isForBrowser -prefsHandle 5400 -prefMapHandle 5392 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b243d845-74d1-4ad4-9082-e8c3707de825} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
              3⤵
                PID:464
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5424 -prefMapHandle 5420 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9cfd97d-1b3e-4717-8a9e-bdb824807eef} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
                3⤵
                  PID:408
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5680 -childID 5 -isForBrowser -prefsHandle 5784 -prefMapHandle 5788 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {546282e7-5da0-446c-b7ec-568ac7c56d9c} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
                  3⤵
                    PID:1072
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3156 -childID 6 -isForBrowser -prefsHandle 3168 -prefMapHandle 3196 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6738d3fc-c05a-4daf-930d-d95a16729fa6} 3692 "\\.\pipe\gecko-crash-server-pipe.3692" tab
                    3⤵
                      PID:4448
                • C:\Windows\System32\rundll32.exe
                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                  1⤵
                    PID:5300
                  • C:\Program Files\7-Zip\7zG.exe
                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\trash_malware\" -spe -an -ai#7zMap27238:88:7zEvent1032
                    1⤵
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of FindShellTrayWindow
                    PID:3160
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat" "
                    1⤵
                    • Checks computer location settings
                    • Suspicious use of SetWindowsHookEx
                    PID:4056
                    • C:\Windows\system32\msg.exe
                      msg * you did a mistake...
                      2⤵
                        PID:1448
                      • C:\Users\Admin\Downloads\trash_malware\trash malware\Zika.exe
                        Zika.exe
                        2⤵
                        • Executes dropped EXE
                        • Drops file in Program Files directory
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4872
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe" -extract C:\Program Files\7-Zip\7z.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, icongroup,,
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:5996
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1232
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe" -extract C:\Program Files\7-Zip\7zFM.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, icongroup,,
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:4380
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3344
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe" -extract C:\Program Files\7-Zip\7zG.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, icongroup,,
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1644
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2036
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe" -extract C:\Program Files\7-Zip\Uninstall.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, icongroup,,
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:3480
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:4364
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe" -addoverwrite C:\Program Files\7-Zip\Uninstall.exe", "C:\Program Files\7-Zip\Uninstall.exe, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res, icongroup,,
                          3⤵
                          • Executes dropped EXE
                          • Drops file in Program Files directory
                          • System Location Discovery: System Language Discovery
                          PID:2880
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, icongroup,,
                          3⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:4724
                        • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe
                          "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res
                          3⤵
                            PID:4784
                          • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe
                            "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, icongroup,,
                            3⤵
                              PID:5392
                            • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe
                              "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res
                              3⤵
                                PID:3668
                              • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe
                                "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, icongroup,,
                                3⤵
                                  PID:768
                                • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe
                                  "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res
                                  3⤵
                                    PID:4056
                                  • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe
                                    "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe" -extract C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, icongroup,,
                                    3⤵
                                      PID:5604
                                    • C:\Windows\SysWOW64\wscript.exe
                                      wscript.exe C:\Users\Public\ghostroot\Message.vbs "C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.rc, C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res
                                      3⤵
                                        PID:1040
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs"
                                      2⤵
                                      • Checks computer location settings
                                      PID:6024
                                      • C:\Windows\System32\wscript.exe
                                        "C:\Windows\System32\wscript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs" /elevated
                                        3⤵
                                        • UAC bypass
                                        • Blocklisted process makes network request
                                        • Checks computer location settings
                                        • Adds Run key to start application
                                        • Checks whether UAC is enabled
                                        • Sets desktop wallpaper using registry
                                        • Drops file in Windows directory
                                        • Modifies Control Panel
                                        • System policy modification
                                        PID:656
                                        • C:\Windows\System32\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c C:\Users\Public\Ghostroot\KillDora.bat
                                          4⤵
                                            PID:4004
                                            • C:\Windows\System32\rundll32.exe
                                              C:\Windows\System32\RUNDLL32.EXE user32.dll, UpdatePerUserSystemParameters
                                              5⤵
                                                PID:1104
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Minimal" /f
                                                5⤵
                                                • Impair Defenses: Safe Mode Boot
                                                PID:4272
                                              • C:\Windows\system32\reg.exe
                                                reg delete "HKLM\System\CurrentControlSet\Control\SafeBoot\Network" /f
                                                5⤵
                                                  PID:4560
                                                • C:\Windows\system32\taskkill.exe
                                                  taskkill /f /im explorer.exe
                                                  5⤵
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2772
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  5⤵
                                                  • Boot or Logon Autostart Execution: Active Setup
                                                  • Enumerates connected drives
                                                  • Checks SCSI registry key(s)
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:2464
                                                • C:\Windows\system32\takeown.exe
                                                  takeown /f C:\Windows\System32\
                                                  5⤵
                                                  • Possible privilege escalation attempt
                                                  • Modifies file permissions
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4324
                                                • C:\Windows\system32\icacls.exe
                                                  icacls C:\Windows\System32 /Grant Users:F
                                                  5⤵
                                                  • Possible privilege escalation attempt
                                                  • Modifies file permissions
                                                  PID:5972
                                                • C:\Windows\system32\takeown.exe
                                                  takeown /f C:\Windows\
                                                  5⤵
                                                  • Possible privilege escalation attempt
                                                  • Modifies file permissions
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1888
                                                • C:\Windows\system32\icacls.exe
                                                  icacls C:\Windows\ /Grant Users:F
                                                  5⤵
                                                  • Possible privilege escalation attempt
                                                  • Modifies file permissions
                                                  PID:6104
                                          • C:\Users\Admin\Downloads\trash_malware\trash malware\IconDance.exe
                                            IconDance.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:5648
                                          • C:\Users\Admin\Downloads\trash_malware\trash malware\Illerka.C.exe
                                            Illerka.C.exe
                                            2⤵
                                            • UAC bypass
                                            • Executes dropped EXE
                                            • Checks whether UAC is enabled
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            • System policy modification
                                            PID:3684
                                          • C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exe
                                            FreeYoutubeDownloader.exe
                                            2⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            PID:6056
                                            • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe
                                              "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:1896
                                          • C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe
                                            XPAntivirus2008.exe
                                            2⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Adds Run key to start application
                                            • Drops file in Program Files directory
                                            • System Location Discovery: System Language Discovery
                                            PID:3300
                                            • C:\Windows\SysWOW64\wscript.exe
                                              wscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Antivirus XP 2008.lnk"
                                              3⤵
                                              • Checks computer location settings
                                              • System Location Discovery: System Language Discovery
                                              PID:5676
                                            • C:\Windows\SysWOW64\wscript.exe
                                              wscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Register Antivirus XP 2008.lnk"
                                              3⤵
                                              • Checks computer location settings
                                              • System Location Discovery: System Language Discovery
                                              PID:6080
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\system32\cmd.exe" /c odio.bat "C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2236
                                            • C:\Program Files (x86)\rhc181j0et18\rhc181j0et18.exe
                                              "C:\Program Files (x86)\rhc181j0et18\rhc181j0et18.exe"
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Drops file in System32 directory
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious behavior: GetForegroundWindowSpam
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              • Suspicious use of SetWindowsHookEx
                                              PID:5624
                                              • C:\Windows\SysWOW64\pphc581j0et18.exe
                                                "C:\Windows\system32\pphc581j0et18.exe"
                                                4⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                PID:5716
                                          • C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPro2017.exe
                                            AntivirusPro2017.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            • Enumerates connected drives
                                            • Writes to the Master Boot Record (MBR)
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            • Suspicious use of SetWindowsHookEx
                                            PID:756
                                          • C:\Users\Admin\Downloads\trash_malware\trash malware\HappyAntivirus.exe
                                            HappyAntivirus.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of FindShellTrayWindow
                                            • Suspicious use of SendNotifyMessage
                                            PID:2196
                                          • C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPlatinum.exe
                                            AntivirusPlatinum.exe
                                            2⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            PID:6040
                                            • C:\WINDOWS\302746537.exe
                                              "C:\WINDOWS\302746537.exe"
                                              3⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              PID:464
                                              • C:\Windows\SysWOW64\cmd.exe
                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E64A.tmp\302746537.bat" "
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:636
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  regsvr32 /s c:\windows\comctl32.ocx
                                                  5⤵
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  PID:5852
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  regsvr32 /s c:\windows\mscomctl.ocx
                                                  5⤵
                                                  • Loads dropped DLL
                                                  • System Location Discovery: System Language Discovery
                                                  • Modifies registry class
                                                  PID:820
                                                • \??\c:\windows\antivirus-platinum.exe
                                                  c:\windows\antivirus-platinum.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:2960
                                                • C:\Windows\SysWOW64\attrib.exe
                                                  attrib +h c:\windows\antivirus-platinum.exe
                                                  5⤵
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  • Views/modifies file attributes
                                                  PID:5248
                                          • C:\Users\Admin\Downloads\trash_malware\trash malware\icons.exe
                                            icons.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:5640
                                          • C:\Users\Admin\Downloads\trash_malware\trash malware\Bonzify.exe
                                            Bonzify.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Drops file in Windows directory
                                            • System Location Discovery: System Language Discovery
                                            PID:4756
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KillAgent.bat"
                                              3⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:3912
                                              • C:\Windows\SysWOW64\taskkill.exe
                                                taskkill /f /im AgentSvr.exe
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4536
                                              • C:\Windows\SysWOW64\takeown.exe
                                                takeown /r /d y /f C:\Windows\MsAgent
                                                4⤵
                                                • Possible privilege escalation attempt
                                                • Modifies file permissions
                                                • System Location Discovery: System Language Discovery
                                                PID:1964
                                              • C:\Windows\SysWOW64\icacls.exe
                                                icacls C:\Windows\MsAgent /c /t /grant "everyone":(f)
                                                4⤵
                                                • Possible privilege escalation attempt
                                                • Modifies file permissions
                                                • System Location Discovery: System Language Discovery
                                                PID:5804
                                            • C:\Users\Admin\AppData\Local\Temp\INSTALLER.exe
                                              INSTALLER.exe /q
                                              3⤵
                                                PID:3300
                                                • C:\Windows\SysWOW64\regsvr32.exe
                                                  regsvr32 /s "C:\Windows\msagent\AgentCtl.dll"
                                                  4⤵
                                                    PID:5208
                                                  • C:\Windows\SysWOW64\regsvr32.exe
                                                    regsvr32 /s "C:\Windows\msagent\AgentDPv.dll"
                                                    4⤵
                                                      PID:4092
                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                      regsvr32 /s "C:\Windows\msagent\mslwvtts.dll"
                                                      4⤵
                                                        PID:4300
                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                        regsvr32 /s "C:\Windows\msagent\AgentDP2.dll"
                                                        4⤵
                                                          PID:4152
                                                        • C:\Windows\SysWOW64\regsvr32.exe
                                                          regsvr32 /s "C:\Windows\msagent\AgentMPx.dll"
                                                          4⤵
                                                            PID:3652
                                                          • C:\Windows\SysWOW64\regsvr32.exe
                                                            regsvr32 /s "C:\Windows\msagent\AgentSR.dll"
                                                            4⤵
                                                              PID:3108
                                                            • C:\Windows\SysWOW64\regsvr32.exe
                                                              regsvr32 /s "C:\Windows\msagent\AgentPsh.dll"
                                                              4⤵
                                                                PID:2604
                                                              • C:\Windows\msagent\AgentSvr.exe
                                                                "C:\Windows\msagent\AgentSvr.exe" /regserver
                                                                4⤵
                                                                  PID:5212
                                                                • C:\Windows\SysWOW64\grpconv.exe
                                                                  grpconv.exe -o
                                                                  4⤵
                                                                    PID:1520
                                                                • C:\Users\Admin\AppData\Local\Temp\INSTALLER.exe
                                                                  INSTALLER.exe /q
                                                                  3⤵
                                                                    PID:4016
                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                      regsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll
                                                                      4⤵
                                                                        PID:3288
                                                                      • C:\Windows\SysWOW64\regsvr32.exe
                                                                        regsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll
                                                                        4⤵
                                                                          PID:4832
                                                                        • C:\Windows\SysWOW64\grpconv.exe
                                                                          grpconv.exe -o
                                                                          4⤵
                                                                            PID:2656
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                      1⤵
                                                                        PID:5516
                                                                      • C:\Windows\explorer.exe
                                                                        explorer.exe
                                                                        1⤵
                                                                          PID:2252
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                            PID:1944
                                                                          • C:\Windows\explorer.exe
                                                                            explorer.exe
                                                                            1⤵
                                                                              PID:5804
                                                                            • C:\Windows\msagent\AgentSvr.exe
                                                                              C:\Windows\msagent\AgentSvr.exe -Embedding
                                                                              1⤵
                                                                                PID:6028
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                1⤵
                                                                                  PID:1568
                                                                                • C:\Windows\system32\AUDIODG.EXE
                                                                                  C:\Windows\system32\AUDIODG.EXE 0x4ec 0x514
                                                                                  1⤵
                                                                                    PID:5092
                                                                                  • C:\Windows\system32\wscript.exe
                                                                                    wscript.exe C:\Users\Public\ghostroot\Message.vbs explorer.exe
                                                                                    1⤵
                                                                                      PID:5020

                                                                                    Network

                                                                                    MITRE ATT&CK Enterprise v15

                                                                                    Replay Monitor

                                                                                    Loading Replay Monitor...

                                                                                    Downloads

                                                                                    • C:\Program Files (x86)\rhc181j0et18\MFC71.dll

                                                                                      Filesize

                                                                                      1.0MB

                                                                                      MD5

                                                                                      f35a584e947a5b401feb0fe01db4a0d7

                                                                                      SHA1

                                                                                      664dc99e78261a43d876311931694b6ef87cc8b9

                                                                                      SHA256

                                                                                      4da5efdc46d126b45daeee8bc69c0ba2aa243589046b7dfd12a7e21b9bee6a32

                                                                                      SHA512

                                                                                      b1ced222c3b7e63e22d093c8aa3467f5ea20312fe76a112baed7c63d238bbe8dee94dfe8f42474f7b1de7aa7acb8ba8e2b36fdd0a3cda83ee85ac9a34f859fa4

                                                                                    • C:\Program Files (x86)\rhc181j0et18\Uninstall.exe

                                                                                      Filesize

                                                                                      75KB

                                                                                      MD5

                                                                                      373ab9f3666e444d538dab8e35d56730

                                                                                      SHA1

                                                                                      e5498ad390b38983a887e850e48c6235b4be3249

                                                                                      SHA256

                                                                                      8536a124573aee7b65d87e6d7d7bbc480a3084bef0ea75c1e82816a64817a451

                                                                                      SHA512

                                                                                      f18112b60ac9ad4b563fec2b895e82be08d776d99a613855c646e1160923c16ca377cc66f7190ce603b2e32b21832d5eb0335daa4f6057ee47cb79110db9bc07

                                                                                    • C:\Program Files (x86)\rhc181j0et18\msvcp71.dll

                                                                                      Filesize

                                                                                      488KB

                                                                                      MD5

                                                                                      561fa2abb31dfa8fab762145f81667c2

                                                                                      SHA1

                                                                                      c8ccb04eedac821a13fae314a2435192860c72b8

                                                                                      SHA256

                                                                                      df96156f6a548fd6fe5672918de5ae4509d3c810a57bffd2a91de45a3ed5b23b

                                                                                      SHA512

                                                                                      7d960aa8e3cce22d63a6723d7f00c195de7de83b877eca126e339e2d8cc9859e813e05c5c0a5671a75bb717243e9295fd13e5e17d8c6660eb59f5baee63a7c43

                                                                                    • C:\Program Files (x86)\rhc181j0et18\msvcr71.dll

                                                                                      Filesize

                                                                                      340KB

                                                                                      MD5

                                                                                      86f1895ae8c5e8b17d99ece768a70732

                                                                                      SHA1

                                                                                      d5502a1d00787d68f548ddeebbde1eca5e2b38ca

                                                                                      SHA256

                                                                                      8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe

                                                                                      SHA512

                                                                                      3b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da

                                                                                    • C:\Program Files (x86)\rhc181j0et18\rhc181j0et18.exe

                                                                                      Filesize

                                                                                      9.0MB

                                                                                      MD5

                                                                                      04b88c7067b53a9bdf844cd1cb4b9c30

                                                                                      SHA1

                                                                                      7d081a1053cd9ef3d593f5ef9a27303824b779f5

                                                                                      SHA256

                                                                                      d42b135a1e70b6f7d0d98c340f4b529f722953cf57e573bb21a078f50f2016b9

                                                                                      SHA512

                                                                                      566f36f804d3027daab0e01f6d816b0420ba21fc276f2fabda4d0ed37b0e830704dcba8ccc3d30a7023c69f8ad3da0b9b58a49a26b3bb239d8ae0762bc157a42

                                                                                    • C:\Program Files\7-Zip\7z.dll.sys.exe

                                                                                      Filesize

                                                                                      549KB

                                                                                      MD5

                                                                                      0b24892597dcb0257cdb78b5ed165218

                                                                                      SHA1

                                                                                      5fe5d446406ff1e34d2fe3ee347769941636e323

                                                                                      SHA256

                                                                                      707f415d7d581edd9bce99a0429ad4629d3be0316c329e8b9ebd576f7ab50b71

                                                                                      SHA512

                                                                                      24ea9e0f10a283e67850070976c81ae4b2d4d9bb92c6eb41b2557ad3ae02990287531a619cf57cd257011c6770d4c25dd19c3c0e46447eb4d0984d50d869e56f

                                                                                    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\Antivirus XP 2008.lnk

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      52ad2a479b21a09ab1075f13196e04e1

                                                                                      SHA1

                                                                                      76dad1cdf2b0493d7c0ba6784363a8d00dacffb5

                                                                                      SHA256

                                                                                      8e87ada0365f2d36eb02808dedea434f0da4fea0106f888a944d353041cd37b9

                                                                                      SHA512

                                                                                      d5943570a560d0b81b69564bddd767e22dfecf9eaa360611a7adeaeecb24bfba42bb2faec0b3aad4400c41ff05ca22824345979dd21df54aacbe82c6fa1fe9e4

                                                                                    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\Register Antivirus XP 2008.lnk

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      ac7d8457b3b35d36c2fda167e784d1dd

                                                                                      SHA1

                                                                                      a700898d1059298ed7d82fe6c1e15124461719e4

                                                                                      SHA256

                                                                                      08f7ac4359142706642089a5338eb45356bfd01f42661499c177f9d05451cfbd

                                                                                      SHA512

                                                                                      c97d20662ec317b95ca117a44278f8fa96417811072442c34c79f503c723ad92b6453fa13a167e7927893e2665db284afca46031a450a549c35a60e1c262e2bb

                                                                                    • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\icons.res

                                                                                      Filesize

                                                                                      32B

                                                                                      MD5

                                                                                      45d02203801ec5cae86ed0a68727b0fa

                                                                                      SHA1

                                                                                      1b22a6df3fc0ef23c6c5312c937db7c8c0df6703

                                                                                      SHA256

                                                                                      5e743f477333066c29c3742cc8f9f64a8cb9c54b71dbc8c69af5025d31f8c121

                                                                                      SHA512

                                                                                      8da0bf59066223aab96595c9fbf8532baa34f1f9c2c0dee674d310a82677b6c7d6a1cc0bbaa75262b986d2b805b049ec3a2bfb25a9ae30fe6d02e32660f15e83

                                                                                    • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\svchost.exe

                                                                                      Filesize

                                                                                      861KB

                                                                                      MD5

                                                                                      66064dbdb70a5eb15ebf3bf65aba254b

                                                                                      SHA1

                                                                                      0284fd320f99f62aca800fb1251eff4c31ec4ed7

                                                                                      SHA256

                                                                                      6a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795

                                                                                      SHA512

                                                                                      b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f

                                                                                    • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.exe

                                                                                      Filesize

                                                                                      4.1MB

                                                                                      MD5

                                                                                      c6391727ae405fb9812a8ad2a7729402

                                                                                      SHA1

                                                                                      83693dc297392c6a28f7f16d23414c6d62921711

                                                                                      SHA256

                                                                                      d98fbfca17f194400d19111e4813340e6666b254b99f833739b661a4d2d0217c

                                                                                      SHA512

                                                                                      7a4e2ff93d853415d433f5e90b36959c78b77590aa1fa00753831eb4d01cb1a972bb9e39eb8dee5b216005e7709eacda51c0c410aacfe37fcdb163603fd36570

                                                                                    • C:\Users\Admin\AppData\Local\Temp\27a8da7363dd49618ff7d6adcdc51e4c\taskhost.ini

                                                                                      Filesize

                                                                                      44B

                                                                                      MD5

                                                                                      dbfea325d1e00a904309a682051778ad

                                                                                      SHA1

                                                                                      525562934d0866f2ba90b3c25ea005c8c5f1e9fb

                                                                                      SHA256

                                                                                      15a3a3303b4a77272ddb04454333a4c06aa2a113f210ba4a03314026e0821e6d

                                                                                      SHA512

                                                                                      cd853c67c2b1a44c3f592ff42d207b2251e8b9bc1eb22fc12cd710329069ef75abffccd169418c4f9bd008a40f2fbbfc6904519f27fd658f316309f94b8ff59c

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL

                                                                                      Filesize

                                                                                      73KB

                                                                                      MD5

                                                                                      81e5c8596a7e4e98117f5c5143293020

                                                                                      SHA1

                                                                                      45b7fe0989e2df1b4dfd227f8f3b73b6b7df9081

                                                                                      SHA256

                                                                                      7d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004

                                                                                      SHA512

                                                                                      05b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTANM.DLL

                                                                                      Filesize

                                                                                      40KB

                                                                                      MD5

                                                                                      48c00a7493b28139cbf197ccc8d1f9ed

                                                                                      SHA1

                                                                                      a25243b06d4bb83f66b7cd738e79fccf9a02b33b

                                                                                      SHA256

                                                                                      905cb1a15eccaa9b79926ee7cfe3629a6f1c6b24bdd6cea9ccb9ebc9eaa92ff7

                                                                                      SHA512

                                                                                      c0b0a410ded92adc24c0f347a57d37e7465e50310011a9d636c5224d91fbc5d103920ab5ef86f29168e325b189d2f74659f153595df10eef3a9d348bb595d830

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTCTL.DLL

                                                                                      Filesize

                                                                                      160KB

                                                                                      MD5

                                                                                      237e13b95ab37d0141cf0bc585b8db94

                                                                                      SHA1

                                                                                      102c6164c21de1f3e0b7d487dd5dc4c5249e0994

                                                                                      SHA256

                                                                                      d19b6b7c57bcee7239526339e683f62d9c2f9690947d0a446001377f0b56103a

                                                                                      SHA512

                                                                                      9d0a68a806be25d2eeedba8be1acc2542d44ecd8ba4d9d123543d0f7c4732e1e490bad31cad830f788c81395f6b21d5a277c0bed251c9854440a662ac36ac4cb

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTDP2.DLL

                                                                                      Filesize

                                                                                      60KB

                                                                                      MD5

                                                                                      a334bbf5f5a19b3bdb5b7f1703363981

                                                                                      SHA1

                                                                                      6cb50b15c0e7d9401364c0fafeef65774f5d1a2c

                                                                                      SHA256

                                                                                      c33beaba130f8b740dddb9980fe9012f9322ac6e94f36a6aa6086851c51b98de

                                                                                      SHA512

                                                                                      1fa170f643054c0957ed1257c4d7778976c59748670afa877d625aaa006325404bc17c41b47be2906dd3f1e229870d54eb7aba4a412de5adedbd5387e24abf46

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTDPV.DLL

                                                                                      Filesize

                                                                                      64KB

                                                                                      MD5

                                                                                      7c5aefb11e797129c9e90f279fbdf71b

                                                                                      SHA1

                                                                                      cb9d9cbfbebb5aed6810a4e424a295c27520576e

                                                                                      SHA256

                                                                                      394a17150b8774e507b8f368c2c248c10fce50fc43184b744e771f0e79ecafed

                                                                                      SHA512

                                                                                      df59a30704d62fa2d598a5824aa04b4b4298f6192a01d93d437b46c4f907c90a1bad357199c51a62beb87cd724a30af55a619baef9ecf2cba032c5290938022a

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTMPX.DLL

                                                                                      Filesize

                                                                                      60KB

                                                                                      MD5

                                                                                      4fbbaac42cf2ecb83543f262973d07c0

                                                                                      SHA1

                                                                                      ab1b302d7cce10443dfc14a2eba528a0431e1718

                                                                                      SHA256

                                                                                      6550582e41fc53b8a7ccdf9ac603216937c6ff2a28e9538610adb7e67d782ab5

                                                                                      SHA512

                                                                                      4146999b4bec85bcd2774ac242cb50797134e5180a3b3df627106cdfa28f61aeea75a7530094a9b408bc9699572cae8cf998108bde51b57a6690d44f0b34b69e

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTPSH.DLL

                                                                                      Filesize

                                                                                      36KB

                                                                                      MD5

                                                                                      b4ac608ebf5a8fdefa2d635e83b7c0e8

                                                                                      SHA1

                                                                                      d92a2861d5d1eb67ab434ff2bd0a11029b3bd9a9

                                                                                      SHA256

                                                                                      8414dfe399813b7426c235ba1e625bd2b5635c8140da0d0cfc947f6565fe415f

                                                                                      SHA512

                                                                                      2c42daade24c3ff01c551a223ee183301518357990a9cb2cc2dd7bf411b7059ff8e0bf1d1aee2d268eca58db25902a8048050bdb3cb48ae8be1e4c2631e3d9b4

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTSR.DLL

                                                                                      Filesize

                                                                                      60KB

                                                                                      MD5

                                                                                      9fafb9d0591f2be4c2a846f63d82d301

                                                                                      SHA1

                                                                                      1df97aa4f3722b6695eac457e207a76a6b7457be

                                                                                      SHA256

                                                                                      e78e74c24d468284639faf9dcfdba855f3e4f00b2f26db6b2c491fa51da8916d

                                                                                      SHA512

                                                                                      ac0d97833beec2010f79cb1fbdb370d3a812042957f4643657e15eed714b9117c18339c737d3fd95011f873cda46ae195a5a67ae40ff2a5bcbee54d1007f110a

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTSVR.EXE

                                                                                      Filesize

                                                                                      268KB

                                                                                      MD5

                                                                                      5c91bf20fe3594b81052d131db798575

                                                                                      SHA1

                                                                                      eab3a7a678528b5b2c60d65b61e475f1b2f45baa

                                                                                      SHA256

                                                                                      e8ce546196b6878a8c34da863a6c8a7e34af18fb9b509d4d36763734efa2d175

                                                                                      SHA512

                                                                                      face50db7025e0eb2e67c4f8ec272413d13491f7438287664593636e3c7e3accaef76c3003a299a1c5873d388b618da9eaede5a675c91f4c1f570b640ac605d6

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT0409.DLL

                                                                                      Filesize

                                                                                      28KB

                                                                                      MD5

                                                                                      0cbf0f4c9e54d12d34cd1a772ba799e1

                                                                                      SHA1

                                                                                      40e55eb54394d17d2d11ca0089b84e97c19634a7

                                                                                      SHA256

                                                                                      6b0b57e5b27d901f4f106b236c58d0b2551b384531a8f3dad6c06ed4261424b1

                                                                                      SHA512

                                                                                      bfdb6e8387ffbba3b07869cb3e1c8ca0b2d3336aa474bd19a35e4e3a3a90427e49b4b45c09d8873d9954d0f42b525ed18070b949c6047f4e4cdb096f9c5ae5d5

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT0409.HLP

                                                                                      Filesize

                                                                                      8KB

                                                                                      MD5

                                                                                      466d35e6a22924dd846a043bc7dd94b8

                                                                                      SHA1

                                                                                      35e5b7439e3d49cb9dc57e7ef895a3cd8d80fb10

                                                                                      SHA256

                                                                                      e4ccf06706e68621bb69add3dd88fed82d30ad8778a55907d33f6d093ac16801

                                                                                      SHA512

                                                                                      23b64ed68a8f1df4d942b5a08a6b6296ec5499a13bb48536e8426d9795771dbcef253be738bf6dc7158a5815f8dcc65feb92fadf89ea8054544bb54fc83aa247

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT20.INF

                                                                                      Filesize

                                                                                      2KB

                                                                                      MD5

                                                                                      e4a499b9e1fe33991dbcfb4e926c8821

                                                                                      SHA1

                                                                                      951d4750b05ea6a63951a7667566467d01cb2d42

                                                                                      SHA256

                                                                                      49e6b848f5a708d161f795157333d7e1c7103455a2f47f50895683ef6a1abe4d

                                                                                      SHA512

                                                                                      a291bb986293197a16f75b2473297286525ac5674c08a92c87b5cc1f0f2e62254ea27d626b30898e7857281bdb502f188c365311c99bda5c2dd76da0c82c554a

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGTCTL15.TLB

                                                                                      Filesize

                                                                                      28KB

                                                                                      MD5

                                                                                      f1656b80eaae5e5201dcbfbcd3523691

                                                                                      SHA1

                                                                                      6f93d71c210eb59416e31f12e4cc6a0da48de85b

                                                                                      SHA256

                                                                                      3f8adc1e332dd5c252bbcf92bf6079b38a74d360d94979169206db34e6a24cd2

                                                                                      SHA512

                                                                                      e9c216b9725bd419414155cfdd917f998aa41c463bc46a39e0c025aa030bc02a60c28ac00d03643c24472ffe20b8bbb5447c1a55ff07db3a41d6118b647a0003

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGTINST.INF

                                                                                      Filesize

                                                                                      7KB

                                                                                      MD5

                                                                                      b127d9187c6dbb1b948053c7c9a6811f

                                                                                      SHA1

                                                                                      b3073c8cad22c87dd9b8f76b6ffd0c4d0a2010d9

                                                                                      SHA256

                                                                                      bd1295d19d010d4866c9d6d87877913eee69e279d4d089e5756ba285f3424e00

                                                                                      SHA512

                                                                                      88e447dd4db40e852d77016cfd24e09063490456c1426a779d33d8a06124569e26597bb1e46a3a2bbf78d9bffee46402c41f0ceb44970d92c69002880ddc0476

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSLWVTTS.DLL

                                                                                      Filesize

                                                                                      52KB

                                                                                      MD5

                                                                                      316999655fef30c52c3854751c663996

                                                                                      SHA1

                                                                                      a7862202c3b075bdeb91c5e04fe5ff71907dae59

                                                                                      SHA256

                                                                                      ea4ca740cd60d2c88280ff8115bf354876478ef27e9e676d8b66601b4e900ba0

                                                                                      SHA512

                                                                                      5555673e9863127749fc240f09cf3fb46e2019b459ad198ba1dc356ba321c41e4295b6b2e2d67079421d7e6d2fb33542b81b0c7dae812fe8e1a87ded044edd44

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Msvcirt.dll

                                                                                      Filesize

                                                                                      76KB

                                                                                      MD5

                                                                                      e7cd26405293ee866fefdd715fc8b5e5

                                                                                      SHA1

                                                                                      6326412d0ea86add8355c76f09dfc5e7942f9c11

                                                                                      SHA256

                                                                                      647f7534aaaedffa93534e4cb9b24bfcf91524828ff0364d88973be58139e255

                                                                                      SHA512

                                                                                      1114c5f275ecebd5be330aa53ba24d2e7d38fc20bb3bdfa1b872288783ea87a7464d2ab032b542989dee6263499e4e93ca378f9a7d2260aebccbba7fe7f53999

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Msvcp50.dll

                                                                                      Filesize

                                                                                      552KB

                                                                                      MD5

                                                                                      497fd4a8f5c4fcdaaac1f761a92a366a

                                                                                      SHA1

                                                                                      81617006e93f8a171b2c47581c1d67fac463dc93

                                                                                      SHA256

                                                                                      91cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a

                                                                                      SHA512

                                                                                      73d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W95INF16.DLL

                                                                                      Filesize

                                                                                      2KB

                                                                                      MD5

                                                                                      7210d5407a2d2f52e851604666403024

                                                                                      SHA1

                                                                                      242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9

                                                                                      SHA256

                                                                                      337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af

                                                                                      SHA512

                                                                                      1755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W95INF32.DLL

                                                                                      Filesize

                                                                                      4KB

                                                                                      MD5

                                                                                      4be7661c89897eaa9b28dae290c3922f

                                                                                      SHA1

                                                                                      4c9d25195093fea7c139167f0c5a40e13f3000f2

                                                                                      SHA256

                                                                                      e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5

                                                                                      SHA512

                                                                                      2035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\andmoipa.ttf

                                                                                      Filesize

                                                                                      29KB

                                                                                      MD5

                                                                                      c3e8aeabd1b692a9a6c5246f8dcaa7c9

                                                                                      SHA1

                                                                                      4567ea5044a3cef9cb803210a70866d83535ed31

                                                                                      SHA256

                                                                                      38ae07eeb7909bda291d302848b8fe5f11849cf0d597f0e5b300bfed465aed4e

                                                                                      SHA512

                                                                                      f74218681bd9d526b68876331b22080f30507898b6a6ebdf173490ca84b696f06f4c97f894cb6052e926b1eee4b28264db1ead28f3bc9f627b4569c1ddcd2d3e

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv_enua.dll

                                                                                      Filesize

                                                                                      1.2MB

                                                                                      MD5

                                                                                      ed98e67fa8cc190aad0757cd620e6b77

                                                                                      SHA1

                                                                                      0317b10cdb8ac080ba2919e2c04058f1b6f2f94d

                                                                                      SHA256

                                                                                      e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d

                                                                                      SHA512

                                                                                      ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv_enua.hlp

                                                                                      Filesize

                                                                                      11KB

                                                                                      MD5

                                                                                      80d09149ca264c93e7d810aac6411d1d

                                                                                      SHA1

                                                                                      96e8ddc1d257097991f9cc9aaf38c77add3d6118

                                                                                      SHA256

                                                                                      382d745e10944b507a8d9c69ae2e4affd4acf045729a19ac143fa8d9613ccb42

                                                                                      SHA512

                                                                                      8813303cd6559e2cc726921838293377e84f9b5902603dac69d93e217ff3153b82b241d51d15808641b5c4fb99613b83912e9deda9d787b4c8ccfbd6afa56bc9

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv_enua.inf

                                                                                      Filesize

                                                                                      2KB

                                                                                      MD5

                                                                                      0a250bb34cfa851e3dd1804251c93f25

                                                                                      SHA1

                                                                                      c10e47a593c37dbb7226f65ad490ff65d9c73a34

                                                                                      SHA256

                                                                                      85189df1c141ef5d86c93b1142e65bf03db126d12d24e18b93dd4cc9f3e438ae

                                                                                      SHA512

                                                                                      8e056f4aa718221afab91c4307ff87db611faa51149310d990db296f979842d57c0653cb23d53fea54a69c99c4e5087a2eb37daa794ba62e6f08a8da41255795

                                                                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tvenuax.dll

                                                                                      Filesize

                                                                                      40KB

                                                                                      MD5

                                                                                      1587bf2e99abeeae856f33bf98d3512e

                                                                                      SHA1

                                                                                      aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9

                                                                                      SHA256

                                                                                      c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0

                                                                                      SHA512

                                                                                      43161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a

                                                                                    • C:\Users\Admin\AppData\Local\Temp\KillAgent.bat

                                                                                      Filesize

                                                                                      161B

                                                                                      MD5

                                                                                      ea7df060b402326b4305241f21f39736

                                                                                      SHA1

                                                                                      7d58fb4c58e0edb2ddceef4d21581ff9d512fdc2

                                                                                      SHA256

                                                                                      e4edc2cb6317ab19ee1a6327993e9332af35cfbebaff2ac7c3f71d43cfcbe793

                                                                                      SHA512

                                                                                      3147615add5608d0dce7a8b6efbfb19263c51a2e495df72abb67c6db34f5995a27fde55b5af78bbd5a6468b4065942cad4a4d3cb28ab932aad9b0f835aafe4d0

                                                                                    • C:\Users\Admin\AppData\Local\Temp\nswCFE6.tmp\KillSelf.dll

                                                                                      Filesize

                                                                                      5KB

                                                                                      MD5

                                                                                      8b49e96b0bd0fe3822bd4f516ad543ab

                                                                                      SHA1

                                                                                      3d04d3a4377e2e1888cc2be333b129daa8d2894d

                                                                                      SHA256

                                                                                      c25cbc60ff1ccca811239655636717c9ff4decb9190a557489389504b248d037

                                                                                      SHA512

                                                                                      46826285f213137cedefe379ece413730a36dcde016e5ac114743cb011e587fde503df1d70ea0e6c4213993749ac4d246e4c3c980b02e01239b392d0f5892e26

                                                                                    • C:\Users\Admin\AppData\Local\Temp\nswCFE6.tmp\MachineKey.dll

                                                                                      Filesize

                                                                                      52KB

                                                                                      MD5

                                                                                      819265cb9b45d837914f428373b06318

                                                                                      SHA1

                                                                                      0725f84eba20acdbd702b688ea61dee84e370b0c

                                                                                      SHA256

                                                                                      dd2f2d8c0a7d767be40b0f83ac6339ec86068e4ba0f4cd0e3e5b99050dd84fcf

                                                                                      SHA512

                                                                                      ae4dd3f773568072e86e694c72a08d06b9206cb704a22ced1a922bc04a61a504aee67fc32ffb4d39f9e75f74c533d409756d4d953eaf9ab89cc9fe11f702b30c

                                                                                    • C:\Users\Admin\AppData\Local\Temp\nswCFE6.tmp\Mutex.dll

                                                                                      Filesize

                                                                                      3KB

                                                                                      MD5

                                                                                      6899249ce2f6ede73e6fcc40fb31338a

                                                                                      SHA1

                                                                                      385e408274c8d250ccafed3fe7b329b2f3a0df13

                                                                                      SHA256

                                                                                      d02a2c0c9917a5ff728400357aa231473cd20da01b538a0e19bc0c0b885ea212

                                                                                      SHA512

                                                                                      0db15d8050a3d39a14ebe6b58ebd68f0241d3ee688988e1e2217e2c43a834dff0959ba050d7e458ab6dfb466c91a3109ead350fe58fb3daa0753f6ca1ed9d60d

                                                                                    • C:\Users\Admin\AppData\Local\Temp\nswCFE6.tmp\lastpage.ini

                                                                                      Filesize

                                                                                      214B

                                                                                      MD5

                                                                                      14f51baaf9e518780594e20887e6fe36

                                                                                      SHA1

                                                                                      19f934f6a8cb11c53ae06f71457bfa643bb06576

                                                                                      SHA256

                                                                                      99cc25682aa82e36757361afdd6e0436ff56cdc03993e6d60f20d052f8b9dbe5

                                                                                      SHA512

                                                                                      d48e9a9e12a69fef2b6c324a9c2f1fb46d8eb931a4cde955f2c196c3ee78ac80dcfdb98cc17530854c3775db41de66b09b9ba498c550ac500ec40cdefe4caf81

                                                                                    • C:\Users\Admin\AppData\Local\Temp\pin.vbs

                                                                                      Filesize

                                                                                      287B

                                                                                      MD5

                                                                                      3f764ed6ee61afced5405a2e3f62738b

                                                                                      SHA1

                                                                                      ce56c02f451bdbf20a1003df87fc2692ca06d0ed

                                                                                      SHA256

                                                                                      22804ed36ad186b3ab18605719c83e70b6244f60aba00e16ca8f97d80b5cc0e4

                                                                                      SHA512

                                                                                      6ed1d6327b67b3c863f71ede1d8be2f24c51454aab25b104d474024bfafcd732ba84a63ea60b218ce0e97a740c2717f87f4a38fcf211e780d027d36f4bc1d859

                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                      Filesize

                                                                                      479KB

                                                                                      MD5

                                                                                      09372174e83dbbf696ee732fd2e875bb

                                                                                      SHA1

                                                                                      ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                      SHA256

                                                                                      c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                      SHA512

                                                                                      b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                      Filesize

                                                                                      13.8MB

                                                                                      MD5

                                                                                      0a8747a2ac9ac08ae9508f36c6d75692

                                                                                      SHA1

                                                                                      b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                      SHA256

                                                                                      32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                      SHA512

                                                                                      59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\AlternateServices.bin

                                                                                      Filesize

                                                                                      8KB

                                                                                      MD5

                                                                                      5cb05c0f9053a52cd564fbc44efa4c59

                                                                                      SHA1

                                                                                      45620a794c701b9dbfec7aca0deec25f845b0f9d

                                                                                      SHA256

                                                                                      29db14fd34c779b6ca45240348496ada385184c0a742d9fcaac4120a0b41f2de

                                                                                      SHA512

                                                                                      7697fa5be05388ba883c1000c8c90f9b165c75955e9222a56fbd8ec59da8b1208f83cceae20b04f0bfe49b6dd67fc61cad738ac793fd16592faffbd26dcb5731

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\db\data.safe.tmp

                                                                                      Filesize

                                                                                      5KB

                                                                                      MD5

                                                                                      a9c69681e00f70caa3db2b42b3ffbd9a

                                                                                      SHA1

                                                                                      99100ab0eb885fd23000ec07130521b19026e80c

                                                                                      SHA256

                                                                                      b8dda58bc512f9fb48506a28e2e16b913694927616d25498aded426939c08f6f

                                                                                      SHA512

                                                                                      505ccd8f6909928b4d4c6749b6282f80a3e143a4842946cd3ea0a77f3568ae51515b45a29bc7ae7ebe954271133aaf1675156238fa20054214e9874ed010a979

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\db\data.safe.tmp

                                                                                      Filesize

                                                                                      25KB

                                                                                      MD5

                                                                                      1a12fa5d19fa31ce7d95a1db8a339626

                                                                                      SHA1

                                                                                      0d80a50f1671f020d29da9ca5b3fe329584465be

                                                                                      SHA256

                                                                                      8fc933fc6ff95fe6e767b6f64d0b815474a711ebc36ae51ed6a3196b5b3d9ca3

                                                                                      SHA512

                                                                                      98109b1d1a35594ea74b2ae135a62ad5d2188dd76c7fa634764238b0a73137a6161f2a633ffdc189dfdd52f1e421e750d40f18bf3d55b3595a9018664ca251d1

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\db\data.safe.tmp

                                                                                      Filesize

                                                                                      25KB

                                                                                      MD5

                                                                                      e8608ef4cbd1e1f79397937f11d1d07c

                                                                                      SHA1

                                                                                      068385bffa45e10dc35ad94836e99d0345475353

                                                                                      SHA256

                                                                                      5f9d06e79595c4d6d417895f31eebc4bfd4d25aa7b24b3f6bcc164a1c97650b1

                                                                                      SHA512

                                                                                      73afb76ec6a43959ca15b21d6428f0ddb2a5438de9197d9f11c198d6f30fc39e5e1a063949dc4ef4243d132f70e7198d6ab3352bfa1102b23cb5f152af4c5852

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\db\data.safe.tmp

                                                                                      Filesize

                                                                                      6KB

                                                                                      MD5

                                                                                      10f97db089b628f7ddb330629957ddec

                                                                                      SHA1

                                                                                      d7a5a13f04c1bae4423025fcee7ab22b3d4c09da

                                                                                      SHA256

                                                                                      ae83014bb92e2dbdefb3dbd2d310b36e73ceb186b64b20505d6d76e40427b58c

                                                                                      SHA512

                                                                                      2c924dd1e0adc69ef03921cc738f725b04b697496b809cbdef0505a69e51025086fa1b65875c2b4aa14ee1b37e7c976fe3e617d98381180942e12573edf9ee00

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\pending_pings\0474c1de-9b5c-450f-ba5d-7b3238b0f806

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      4076724ede2b30fdbbefb0e219e3cfd8

                                                                                      SHA1

                                                                                      5c946a10328023305dfb86d1116de30c407ec8dd

                                                                                      SHA256

                                                                                      033fc246f7773287ef82d1c90b1d18eaca3243b848f0506d3cb85758c128d91f

                                                                                      SHA512

                                                                                      2286e278914fe369b2b69e5370917ada4968734a03b7de3fc06555edea1c168e31def1f6040f9707433d472a42160f1ac5b099d0bc81bafbf3050e7fe07cfbb8

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\pending_pings\262e47de-1074-417c-b285-b5a9e43f878d

                                                                                      Filesize

                                                                                      982B

                                                                                      MD5

                                                                                      b430d195e40b5769b2d8604da226810f

                                                                                      SHA1

                                                                                      07db2229929b5ac64776671e23af456732ce57ae

                                                                                      SHA256

                                                                                      cfe02017a24f879af2f400f8070a708a9b5bd0406d3fb49d11b51956108a19d7

                                                                                      SHA512

                                                                                      7d9fc8f06eb18c76892eb255ecf79b904333a8c18d8f076602040ac387305cdda38e9b321079105873fbc2b58449740f5bc7fa95e8332db0ad7d208cda4f2935

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\pending_pings\422acb17-6dcc-491f-960a-36a0b40bef87

                                                                                      Filesize

                                                                                      28KB

                                                                                      MD5

                                                                                      d98c047cc730171366d1bf7d84c10df6

                                                                                      SHA1

                                                                                      190abdcfdaf76d71190052b9ad8e35ac35c368af

                                                                                      SHA256

                                                                                      2672247d9047545c424dd34b9bdb4ed428c2048fde60fc8e6e30de091843dc0f

                                                                                      SHA512

                                                                                      d398d6ee70d706a5617b7125809ab8ff302e6954dbcb7afe7769f11e1387693f9261a629d2277c23ae071af4c5724b1300098e7d82775ca73794d1edf292d166

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\datareporting\glean\pending_pings\fe9715f6-ad7f-42d4-aa6e-38e297fc3e42

                                                                                      Filesize

                                                                                      671B

                                                                                      MD5

                                                                                      af58c414372bf0353837cc6e56352f81

                                                                                      SHA1

                                                                                      a132a2c53bb22cf512caf03bca8cdb942a0d7c8f

                                                                                      SHA256

                                                                                      e10779367047ee616ffaae7b92e6f727e4cf12631df1d5aa9a0754a2017beea4

                                                                                      SHA512

                                                                                      36b1080906150fc12f2a69010aabfda931447cd8ced055ef26ad519860448dd42b5c6815ce99f956a8e74140ea6b55dc4b03e74177ebe00586eb77982493e6c3

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                      Filesize

                                                                                      1.1MB

                                                                                      MD5

                                                                                      842039753bf41fa5e11b3a1383061a87

                                                                                      SHA1

                                                                                      3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                      SHA256

                                                                                      d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                      SHA512

                                                                                      d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                      Filesize

                                                                                      116B

                                                                                      MD5

                                                                                      2a461e9eb87fd1955cea740a3444ee7a

                                                                                      SHA1

                                                                                      b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                      SHA256

                                                                                      4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                      SHA512

                                                                                      34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                      Filesize

                                                                                      372B

                                                                                      MD5

                                                                                      bf957ad58b55f64219ab3f793e374316

                                                                                      SHA1

                                                                                      a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                      SHA256

                                                                                      bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                      SHA512

                                                                                      79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                      Filesize

                                                                                      17.8MB

                                                                                      MD5

                                                                                      daf7ef3acccab478aaa7d6dc1c60f865

                                                                                      SHA1

                                                                                      f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                      SHA256

                                                                                      bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                      SHA512

                                                                                      5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\prefs-1.js

                                                                                      Filesize

                                                                                      10KB

                                                                                      MD5

                                                                                      d0003e435aab7349da968afe90a4a03a

                                                                                      SHA1

                                                                                      0f688084fe751bbce809d9697c833a0e88b0ed51

                                                                                      SHA256

                                                                                      3f248b6eadd7e18295d36e1cc419db79daf3d1a1834dcf05a09b0cafe5f250c6

                                                                                      SHA512

                                                                                      3b6f32a38121f96a8f635b2e5e4f114775f1256802842836190bd6745b076d7a14e9764814a4b7b4f075eca6e874b7deb886eedfa35dfaea4b9e3010fe09348c

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\prefs-1.js

                                                                                      Filesize

                                                                                      10KB

                                                                                      MD5

                                                                                      cc0bdd0e9e6f2f0b434ec28a1f6f99b1

                                                                                      SHA1

                                                                                      276067642d12e44e591eb20a45a2fb3f71dc65e4

                                                                                      SHA256

                                                                                      dae3f67f503b3177a99c19b61b9ec7b8c8d225b99c2299b55a42e3a59a1a244e

                                                                                      SHA512

                                                                                      758836bc4b22b044d4f66a488f7fae3298930950bc4ac3796abf7e6f0096fe4a4a5955af15e65ae50669444ef8ebdb83e984e8766676437188313e0fe2a67d87

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\prefs-1.js

                                                                                      Filesize

                                                                                      11KB

                                                                                      MD5

                                                                                      2bd4657553575d177befcafb51626e10

                                                                                      SHA1

                                                                                      ffde0002f1e6167333e03a20821ef63e68d069e5

                                                                                      SHA256

                                                                                      bdb71d52bbe19dac5c7c6bba7a7c8da05d009fc79b5215217570ab04296846d7

                                                                                      SHA512

                                                                                      c6cda6e33d040b3f3233caefd942d2abe3cb65f53edf3eb968493c9828abddbf77e6d4747926604f599662a968d9c16649db9a42ee160d76c03fb9aef75c1c21

                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lxy3zzzm.default-release\sessionstore-backups\recovery.baklz4

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      85bdc501d04d403ed9c982ddbec621a5

                                                                                      SHA1

                                                                                      72278c899b0997b694084b6c85ae2eb084173a63

                                                                                      SHA256

                                                                                      352f9c77fb1a22136034639ba61ba4a335f5c8223e594a053038927b071c3602

                                                                                      SHA512

                                                                                      353dd4bea43c8d80f8fef2b6b76c4475d7e28d527bb67a8afc2a809ad4bb2545ddf668b0dc753ef8fbc70e5c8212394f28659880812840d9d5b62f8a3367a558

                                                                                    • C:\Users\Admin\Downloads\trash_malware.C9eosx6d.zip.part

                                                                                      Filesize

                                                                                      34.7MB

                                                                                      MD5

                                                                                      b42ed53f1fef2c95d0b4c9d034278c2e

                                                                                      SHA1

                                                                                      ec5cedd2939c82688533b4db410671610575e671

                                                                                      SHA256

                                                                                      5bf0dbf99a2eac3b589013c8511413895842232dcd5e6ae608ad3524bce5c7fb

                                                                                      SHA512

                                                                                      9c105ca53533a4af09f262045619bdcf24669743fd10c7ab6c3440aaee0287d049d610b45811c7da40bf23b5a5f96ccb42d0678d845ecb661f3cbf2db313ccca

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPlatinum.exe

                                                                                      Filesize

                                                                                      739KB

                                                                                      MD5

                                                                                      382430dd7eae8945921b7feab37ed36b

                                                                                      SHA1

                                                                                      c95ddaebe2ae8fbcb361f3bf080d95a7bb5bf128

                                                                                      SHA256

                                                                                      70e5e902d0ac7534838b743c899f484fe10766aefacc6df697219387a8e3d06b

                                                                                      SHA512

                                                                                      26abc02bde77f0b94613edc32e0843ac71a0a8f3d8ba01cb94a42c047d0be7befef52a81984e9a0fa867400082a8905e7a63aaaf85fa32a03d27f7bc6a548c3b

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPro2017.exe

                                                                                      Filesize

                                                                                      816KB

                                                                                      MD5

                                                                                      7dfbfba1e4e64a946cb096bfc937fbad

                                                                                      SHA1

                                                                                      9180d2ce387314cd4a794d148ea6b14084c61e1b

                                                                                      SHA256

                                                                                      312f082ea8f64609d30ff62b11f564107bf7a4ec9e95944dfd3da57c6cdb4e94

                                                                                      SHA512

                                                                                      f47b05b9c294688811dd72d17f815cce6c90f96d78f6835804d5182e2f4bfbd2d6738de854b8a79dea6345f9372ba76a36920e51e6cb556ef4b38b620e887eb4

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\AxInterop.WMPLib.dll

                                                                                      Filesize

                                                                                      52KB

                                                                                      MD5

                                                                                      c7c4f36c35198df7d2f23c217f4b89bf

                                                                                      SHA1

                                                                                      9fe2c415e97a8d836cb8b7822d94e8da58014035

                                                                                      SHA256

                                                                                      022c37312348e74e6b20a1f37ba35aa11b5621567529dc18276a855625aa23ab

                                                                                      SHA512

                                                                                      aaa72e56b57ce4a7629229ca88bdb095a18aeeeb947fb80a80a6646e01f99444399acdb49580c9c8d8d6a8757595865ae5e9b995597eebe7e70f6a625a8782de

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Blur.exe

                                                                                      Filesize

                                                                                      70KB

                                                                                      MD5

                                                                                      ab27a4504c98f0e22c266b0a377e5558

                                                                                      SHA1

                                                                                      bc33a3caa48b25d7cdff1c72bc6e5c9ef198df84

                                                                                      SHA256

                                                                                      077609aaef36278a7f2dbbc1e27cf876b7615ea9f7241730154777a36b21a9c5

                                                                                      SHA512

                                                                                      e3a5f3b824bc70b8b4957cdfc3bf53978a6fc96c787b4afd485cc685543603fb5c1bf750723bba000bcdd0441a74212c839020622f35e20e1b588b5d15c3c8c2

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs

                                                                                      Filesize

                                                                                      46KB

                                                                                      MD5

                                                                                      99ec3237394257cb0b5c24affe458f48

                                                                                      SHA1

                                                                                      5300e68423da9712280e601b51622c4b567a23a4

                                                                                      SHA256

                                                                                      ec17f950f6ee9c0c237d93bc0b766aa6e2ab458c70320b534212043128177b51

                                                                                      SHA512

                                                                                      af2394d18f672def6d5d7081def759093759205aac0390ca03591c58c15a02e463a68b583b6fc28ef1368922b4bd5f9072d570ee97a955250a478cdb093500cb

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Bonzify.exe

                                                                                      Filesize

                                                                                      6.4MB

                                                                                      MD5

                                                                                      fba93d8d029e85e0cde3759b7903cee2

                                                                                      SHA1

                                                                                      525b1aa549188f4565c75ab69e51f927204ca384

                                                                                      SHA256

                                                                                      66f62408dfce7c4a5718d2759f1d35721ca22077398850277d16e1fca87fe764

                                                                                      SHA512

                                                                                      7c1441b2e804e925eb5a03e97db620117d3ad4f6981dc020e4e7df4bfc4bd6e414fa3b0ce764481a2cef07eebb2baa87407355bfbe88fab96397d82bd441e6a2

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Circles.exe

                                                                                      Filesize

                                                                                      75KB

                                                                                      MD5

                                                                                      de302cdfae9ca76f4406cd38ee81f594

                                                                                      SHA1

                                                                                      3f104f87a7ef77043025e36afbc1be3aff76a565

                                                                                      SHA256

                                                                                      41702db1a096906e34dc669b5e7385b64c8c108ef7cb779279e80917eb15e4bb

                                                                                      SHA512

                                                                                      88609e5e63825383221f22a75cd2c3cd20d08a8df78c117141288e05a82aebf1a9a4db384634a9db5dc0d767610b07deedad88d08376fe58d7347c1e589f15f9

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\ColorChange.exe

                                                                                      Filesize

                                                                                      71KB

                                                                                      MD5

                                                                                      1db84f940138ade841eb69f2d1b5e657

                                                                                      SHA1

                                                                                      d5d69675ee78842ba397049851617397457d8e23

                                                                                      SHA256

                                                                                      558208dc757f1fb83b56889bb1c44f8b196fbbf1c2864272be8f9106692c5e50

                                                                                      SHA512

                                                                                      9ac57ec73140532501ce4610dce128c7030ec914700687952f67839755bd986243afb32314e0e8f3b13713c4bc8cfa5444772a954088b0a82fa46750aa972520

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exe

                                                                                      Filesize

                                                                                      396KB

                                                                                      MD5

                                                                                      13f4b868603cf0dd6c32702d1bd858c9

                                                                                      SHA1

                                                                                      a595ab75e134f5616679be5f11deefdfaae1de15

                                                                                      SHA256

                                                                                      cae57a60c4d269cd1ca43ef143aedb8bfc4c09a7e4a689544883d05ce89406e7

                                                                                      SHA512

                                                                                      e0d7a81c9cdd15a4ef7c8a9492fffb2c520b28cebc54a139e1bffa5c523cf17dfb9ffe57188cf8843d74479df402306f4f0ce9fc09d87c7cca92aea287e5ff24

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\HappyAntivirus.exe

                                                                                      Filesize

                                                                                      1.9MB

                                                                                      MD5

                                                                                      cb02c0438f3f4ddabce36f8a26b0b961

                                                                                      SHA1

                                                                                      48c4fcb17e93b74030415996c0ec5c57b830ea53

                                                                                      SHA256

                                                                                      64677f7767d6e791341b2eac7b43df90d39d9bdf26d21358578d2d38037e2c32

                                                                                      SHA512

                                                                                      373f91981832cd9a1ff0b8744b43c7574b72971b5b6b19ea1f4665b6c878f7a1c7834ac08b92e0eca299eb4b590bf10f48a0485350a77a5f85fc3d2dd6913db3

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\IconDance.exe

                                                                                      Filesize

                                                                                      301KB

                                                                                      MD5

                                                                                      7ad8c84dea7bd1e9cbb888734db28961

                                                                                      SHA1

                                                                                      58e047c7abecdd31d4e3c937b0ee89c98ab06c6a

                                                                                      SHA256

                                                                                      a4b6e53453d1874a6f78f0d7aa14dfafba778062f4b85b42b4c1001e1fc17095

                                                                                      SHA512

                                                                                      d34b087f7c6dd224e9bfe7a24364f878fc55c5368ce7395349ca063a7fd9ac555baed8431bfa13c331d7e58108b34e0f9d84482ce2e133f623dd086f14345adb

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Illerka.C.exe

                                                                                      Filesize

                                                                                      378KB

                                                                                      MD5

                                                                                      c718a1cbf0e13674714c66694be02421

                                                                                      SHA1

                                                                                      001d5370d3a7ee48db6caaecb1c213b5dfdf8e65

                                                                                      SHA256

                                                                                      cde188d6c4d6e64d6abfdea1e113314f9cdf9417bca36eb7201e6b766e5f5a7f

                                                                                      SHA512

                                                                                      ba0ddff47b618740dfcb63024435c36d895889dd3cf6b4559969283ba8100e8063f5c7767e56dfab67a2b5c96e4ae22e141e5b09e81be5cec9aa7ca7827b4b8a

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Interop.WMPLib.dll

                                                                                      Filesize

                                                                                      323KB

                                                                                      MD5

                                                                                      6515aac6d12e20b052187f256af73b96

                                                                                      SHA1

                                                                                      e91df2fad020ff5f11c28256650d7e231de67b8b

                                                                                      SHA256

                                                                                      4a36aecfb0ade38d252327f534058e3dd2e2209629631b9ad2b1c9cac86aed35

                                                                                      SHA512

                                                                                      ad49c7f734c36eea304846328485b2866d403672511f9df8d4c60038aabbecce952ff5afaf4774eda8dfd7647f0ca1839d136e74dfc16ae43bacd537b453b4b9

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Jigsaw.exe

                                                                                      Filesize

                                                                                      283KB

                                                                                      MD5

                                                                                      2773e3dc59472296cb0024ba7715a64e

                                                                                      SHA1

                                                                                      27d99fbca067f478bb91cdbcb92f13a828b00859

                                                                                      SHA256

                                                                                      3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7

                                                                                      SHA512

                                                                                      6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\PixelateScreen.exe

                                                                                      Filesize

                                                                                      70KB

                                                                                      MD5

                                                                                      09470b2b44940d912f5c7a10d3a0d432

                                                                                      SHA1

                                                                                      5dbd5d9da6abec54a55efb795504109fa98e6ee5

                                                                                      SHA256

                                                                                      8b5d9d7519cdd3571571c38493cfa005886a665a8c38a52b6bb4954a50d788b3

                                                                                      SHA512

                                                                                      83d5b3e8c4387071cb4461762478a7ee988298c0d9eb2f4ab5d7ec2a8f8441b537636e900f7d1460244a507178ddaf5b9e247e2da4bc126858c3cca35ad5e964

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\RotateScreen.exe

                                                                                      Filesize

                                                                                      70KB

                                                                                      MD5

                                                                                      879df4e458fb97f2abe6f3645bb543ee

                                                                                      SHA1

                                                                                      74bc7228383a64b4a7f8f1253398c7a89632f744

                                                                                      SHA256

                                                                                      181fc0d9b1c544f17c270a17dfdf8d288a70ddb5a294e83d45595427f63dbca8

                                                                                      SHA512

                                                                                      16102a70cac5854cdfc72920944baacb55cfd9c5249601d29c0d28af746cbc1e89cb7a951c2b9410fd03ad96eeb49980978e441209c0a4f17ba000a711549c66

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\SOCIAL CREDIT TEST.exe

                                                                                      Filesize

                                                                                      19.7MB

                                                                                      MD5

                                                                                      80c506da3df5e4580c06c48162bccbea

                                                                                      SHA1

                                                                                      43fbccf50f91cd8e1190869b0edc96d920519c14

                                                                                      SHA256

                                                                                      5699b2e12f78b7eeca0633c6a5a93effe7187565eccd7668acccf93c61ab7acb

                                                                                      SHA512

                                                                                      f4a424bf758bb48da944701397ac1e82bb72a15ea4e8818535f2e52199d37e9caf4361303fee4bd9d6db528e1c0171d1612aebc5f636ca9c4ee4fd795432b8c5

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Trippy.exe

                                                                                      Filesize

                                                                                      70KB

                                                                                      MD5

                                                                                      fabbdea167d0a67995b6b237bbe5bbc0

                                                                                      SHA1

                                                                                      e8fb070ace251f5befb5d1f7805358def825380a

                                                                                      SHA256

                                                                                      b9b4fb216e8c48f3ec1d59bbbd3d834effd8b665941c4d1319083c96d3606e74

                                                                                      SHA512

                                                                                      54934229a2ec3f4fc45ebdd0214b6268528fa0d13c601909f9d62e3aee490448f729349ec3da9a58081191ffd13000fe42079bf06cedfce5fe0619a2e493a145

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Trojan.VBS.Bolbi v2.exe

                                                                                      Filesize

                                                                                      1.1MB

                                                                                      MD5

                                                                                      584f03161a17b36b2f5163dd85bc0b77

                                                                                      SHA1

                                                                                      04dad07d0146ff09c0dacc3f248dbda16055a609

                                                                                      SHA256

                                                                                      ee2a2b418e82683de196beb5d4f6cb213e7579d783b06b9949f4a988f515b324

                                                                                      SHA512

                                                                                      530ef231a0fea29700d8bbffa5ed40b4cc05b96323fcbd853e86f050362d84f8a5250387f86a47ec0f103a76b00bada9c352a3c6c76736740984732c184003ff

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe

                                                                                      Filesize

                                                                                      1.3MB

                                                                                      MD5

                                                                                      e979fb2eb504972ed87ad3c825ec6c2c

                                                                                      SHA1

                                                                                      7a927cfa6d413f66da1ae05f668ce85b3547aaf2

                                                                                      SHA256

                                                                                      9d45ae1d8d3749efbe72b24bc20142e8c55b88a0733a45e5fe8579cf24981f33

                                                                                      SHA512

                                                                                      df1b55bff5fdee03cd77d59befe5ccfef555100605f7e9782e0a90e21ad6f67c92bdf925e2844d042c9da48e1c05eb4970460683aebbec2bf5a3f9cf6341bee6

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\Zika.exe

                                                                                      Filesize

                                                                                      5.6MB

                                                                                      MD5

                                                                                      40228458ca455d28e33951a2f3844209

                                                                                      SHA1

                                                                                      86165eb8eb3e99b6efa25426508a323be0e68a44

                                                                                      SHA256

                                                                                      1a904494bb7a21512af6013fe65745e7898cdd6fadac8cb58be04e02346ed95f

                                                                                      SHA512

                                                                                      da62cc244f9924444c7cb4fdbd46017c65e6130d639f6696f7930d867017c211df8b18601bfdaaee65438cee03977848513d7f08987b9b945f3f05241f55ec39

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\gaben64.exe

                                                                                      Filesize

                                                                                      1.5MB

                                                                                      MD5

                                                                                      c75a53e3d52543b1f7f18dced4d2e7e6

                                                                                      SHA1

                                                                                      a570b105c8433333152da79d0d584cbf58fa028d

                                                                                      SHA256

                                                                                      44700e507a6d0f3da8a625affe35264963bc6ce21b4c45b1bd5f8636f73324f0

                                                                                      SHA512

                                                                                      a7bf4dac1eac425a3e7613a417fc8de7c841d8dfcc36786e08bcd384399b9ab62013f4ffa820fee3485b878ec7f1318ae406257a4bc52f0e8142112488631a6e

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\icons.exe

                                                                                      Filesize

                                                                                      105KB

                                                                                      MD5

                                                                                      3ca1d5768c2944d4284b1541653823c7

                                                                                      SHA1

                                                                                      85cf021ac23cd1340c6d649e6a77a213c1f848b6

                                                                                      SHA256

                                                                                      4172c6120f8f98685698365d6dd52c80eb2080203cdde479009bf8f4fa770af0

                                                                                      SHA512

                                                                                      7972adb329dbebc347b8a68789bbac4ba7c230cc980910d18a322d1a512015633d2a5801e76c0aae2fcfe120790c69417864549787dfc37574fb0aa3bfc202f0

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\mbrsetup.exe

                                                                                      Filesize

                                                                                      1.3MB

                                                                                      MD5

                                                                                      5075aa1815f57f9df355bc0c1ed96bac

                                                                                      SHA1

                                                                                      b56eee0afb749e2faa4da62340e0dfc1a4891348

                                                                                      SHA256

                                                                                      c69d5d57a31933f5e855f1ef0d2d451beece6d376b95eecfe2bc3140b0410857

                                                                                      SHA512

                                                                                      07a4e32ab14386d02e9297e5bc06a9a24e4accfdbf0d5a445661338472dee345de7f75b6e1de09a11e94d558a15b309280840b65afd9faf4a0ac1af1421fc8fe

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\putin.exe

                                                                                      Filesize

                                                                                      1.3MB

                                                                                      MD5

                                                                                      1181b60d1b2f613141858e09f5baed74

                                                                                      SHA1

                                                                                      c1ad5d6e20153c60310059110d2981c5551f32f5

                                                                                      SHA256

                                                                                      a54871a86ea0ab334357133661e3e5b36e8b03e91f6037639315e109499339a7

                                                                                      SHA512

                                                                                      1aec1047cd576325e2ceb62e98a1e1349e3cf2fdd2393cb22f36af253f66df426fbf94e697e43d4ddcff1d2f6be1c930c18632c4ebdb5c9f312879a451250117

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat

                                                                                      Filesize

                                                                                      719B

                                                                                      MD5

                                                                                      ee0ba5ac6286067906edfe7c8367861d

                                                                                      SHA1

                                                                                      c353a265322aba64efde0fcdcebb312eb3b796da

                                                                                      SHA256

                                                                                      e3b251dead6eaec37594847e109453da719d2f8c59b14b15632d5252b5fb5e07

                                                                                      SHA512

                                                                                      d5208a625e90acab9ca22d2471a19dee210aa8988fdb760fefb098a0108fe77abe65a860810f43fb78ecc72ef58c50b39a0b2d2100d85152c3901baf0e94295c

                                                                                    • C:\Users\Admin\Downloads\trash_malware\trash malware\sweeney64.exe

                                                                                      Filesize

                                                                                      1.2MB

                                                                                      MD5

                                                                                      983d92b95c706a99fc613e59ba5d45c4

                                                                                      SHA1

                                                                                      f4b63d88ce8ce5df0e2a8a6b1e5954188f2a45a5

                                                                                      SHA256

                                                                                      6ea7e86a7de8be07b56496385b5584d417dfeb0a7198d2766d508697327932ac

                                                                                      SHA512

                                                                                      4a53dadf6b6009ab0bb6dd382735fc2d9c5c13792d76212b9b3762fe458493061ac37d87bde877876ff20b8019aaf4bfe018edc6157c3dc5cfc7ab7f19a2f300

                                                                                    • C:\Users\Admin\Music\Slap1.vbs

                                                                                      Filesize

                                                                                      378KB

                                                                                      MD5

                                                                                      ca6a12a004042ac4395c026e426051c4

                                                                                      SHA1

                                                                                      e52c3331c149e084eadfe35125cf5a1dc1684b38

                                                                                      SHA256

                                                                                      f1de4a353aca4bb6c45e62c7592de8263b929443199dd7c91bd0d97f3b8870af

                                                                                      SHA512

                                                                                      ddc4d8fe90ea5c725d775c7cd28b0faab93fec3ce811fe7673eed6e968eabae20c4a852d92863ac36ca881329d639175656b1ed914fcf8ff7fdd6dd23db78080

                                                                                    • C:\Windows\302746537.exe

                                                                                      Filesize

                                                                                      22KB

                                                                                      MD5

                                                                                      8703ff2e53c6fd3bc91294ef9204baca

                                                                                      SHA1

                                                                                      3dbb8f7f5dfe6b235486ab867a2844b1c2143733

                                                                                      SHA256

                                                                                      3028a2b0e95143a4caa9bcd6ae794958e7469a20c6e673da067958cbf4310035

                                                                                      SHA512

                                                                                      d5eb8a07457a78f9acd0f81d2f58bbf64b52183318b87c353a590cd2a3ac3a6ec9c1452bd52306c7cf99f19b6a897b16ceb8289a7d008c5ce3b07eda9b871204

                                                                                    • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe

                                                                                      Filesize

                                                                                      153KB

                                                                                      MD5

                                                                                      f33a4e991a11baf336a2324f700d874d

                                                                                      SHA1

                                                                                      9da1891a164f2fc0a88d0de1ba397585b455b0f4

                                                                                      SHA256

                                                                                      a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7

                                                                                      SHA512

                                                                                      edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20

                                                                                    • memory/464-911-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/464-930-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/464-951-0x0000000071F90000-0x0000000071FA9000-memory.dmp

                                                                                      Filesize

                                                                                      100KB

                                                                                    • memory/464-795-0x0000000000400000-0x0000000000410000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/756-3954-0x0000000000400000-0x0000000000A06000-memory.dmp

                                                                                      Filesize

                                                                                      6.0MB

                                                                                    • memory/756-948-0x0000000000400000-0x0000000000A06000-memory.dmp

                                                                                      Filesize

                                                                                      6.0MB

                                                                                    • memory/756-652-0x0000000000400000-0x0000000000A06000-memory.dmp

                                                                                      Filesize

                                                                                      6.0MB

                                                                                    • memory/756-2712-0x0000000000400000-0x0000000000A06000-memory.dmp

                                                                                      Filesize

                                                                                      6.0MB

                                                                                    • memory/756-955-0x0000000000400000-0x0000000000A06000-memory.dmp

                                                                                      Filesize

                                                                                      6.0MB

                                                                                    • memory/756-961-0x0000000000400000-0x0000000000A06000-memory.dmp

                                                                                      Filesize

                                                                                      6.0MB

                                                                                    • memory/756-870-0x0000000000400000-0x0000000000A06000-memory.dmp

                                                                                      Filesize

                                                                                      6.0MB

                                                                                    • memory/756-5347-0x0000000000400000-0x0000000000A06000-memory.dmp

                                                                                      Filesize

                                                                                      6.0MB

                                                                                    • memory/756-1332-0x0000000000400000-0x0000000000A06000-memory.dmp

                                                                                      Filesize

                                                                                      6.0MB

                                                                                    • memory/768-1330-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                                      Filesize

                                                                                      884KB

                                                                                    • memory/1232-860-0x0000000000400000-0x000000000084A000-memory.dmp

                                                                                      Filesize

                                                                                      4.3MB

                                                                                    • memory/1644-897-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                                      Filesize

                                                                                      884KB

                                                                                    • memory/1896-743-0x00000277549E0000-0x0000027754A0E000-memory.dmp

                                                                                      Filesize

                                                                                      184KB

                                                                                    • memory/2036-900-0x0000000000400000-0x000000000084A000-memory.dmp

                                                                                      Filesize

                                                                                      4.3MB

                                                                                    • memory/2196-659-0x0000000000A90000-0x0000000000C82000-memory.dmp

                                                                                      Filesize

                                                                                      1.9MB

                                                                                    • memory/2196-667-0x00000000055C0000-0x00000000055CA000-memory.dmp

                                                                                      Filesize

                                                                                      40KB

                                                                                    • memory/2196-660-0x0000000005520000-0x00000000055BC000-memory.dmp

                                                                                      Filesize

                                                                                      624KB

                                                                                    • memory/2196-668-0x0000000005850000-0x00000000058A6000-memory.dmp

                                                                                      Filesize

                                                                                      344KB

                                                                                    • memory/2880-922-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                                      Filesize

                                                                                      884KB

                                                                                    • memory/2960-959-0x0000000000400000-0x000000000040D000-memory.dmp

                                                                                      Filesize

                                                                                      52KB

                                                                                    • memory/3344-888-0x0000000000400000-0x000000000084A000-memory.dmp

                                                                                      Filesize

                                                                                      4.3MB

                                                                                    • memory/3480-912-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                                      Filesize

                                                                                      884KB

                                                                                    • memory/3668-1296-0x0000000000400000-0x000000000084A000-memory.dmp

                                                                                      Filesize

                                                                                      4.3MB

                                                                                    • memory/4056-1380-0x0000000000400000-0x000000000084A000-memory.dmp

                                                                                      Filesize

                                                                                      4.3MB

                                                                                    • memory/4364-915-0x0000000000400000-0x000000000084A000-memory.dmp

                                                                                      Filesize

                                                                                      4.3MB

                                                                                    • memory/4380-884-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                                      Filesize

                                                                                      884KB

                                                                                    • memory/4724-937-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                                      Filesize

                                                                                      884KB

                                                                                    • memory/4784-1138-0x0000000000400000-0x000000000084A000-memory.dmp

                                                                                      Filesize

                                                                                      4.3MB

                                                                                    • memory/4872-595-0x0000000005130000-0x00000000051C2000-memory.dmp

                                                                                      Filesize

                                                                                      584KB

                                                                                    • memory/4872-593-0x0000000000120000-0x00000000006CC000-memory.dmp

                                                                                      Filesize

                                                                                      5.7MB

                                                                                    • memory/4872-594-0x00000000056E0000-0x0000000005C84000-memory.dmp

                                                                                      Filesize

                                                                                      5.6MB

                                                                                    • memory/5392-1147-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                                      Filesize

                                                                                      884KB

                                                                                    • memory/5604-1487-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                                      Filesize

                                                                                      884KB

                                                                                    • memory/5624-1148-0x0000000000400000-0x0000000000D72000-memory.dmp

                                                                                      Filesize

                                                                                      9.4MB

                                                                                    • memory/5624-851-0x0000000000400000-0x0000000000D72000-memory.dmp

                                                                                      Filesize

                                                                                      9.4MB

                                                                                    • memory/5624-857-0x0000000000400000-0x0000000000D72000-memory.dmp

                                                                                      Filesize

                                                                                      9.4MB

                                                                                    • memory/5624-952-0x0000000000400000-0x0000000000D72000-memory.dmp

                                                                                      Filesize

                                                                                      9.4MB

                                                                                    • memory/5624-953-0x0000000000400000-0x0000000000D72000-memory.dmp

                                                                                      Filesize

                                                                                      9.4MB

                                                                                    • memory/5624-858-0x0000000000400000-0x0000000000D72000-memory.dmp

                                                                                      Filesize

                                                                                      9.4MB

                                                                                    • memory/5624-916-0x0000000000400000-0x0000000000D72000-memory.dmp

                                                                                      Filesize

                                                                                      9.4MB

                                                                                    • memory/5624-859-0x0000000000400000-0x0000000000D72000-memory.dmp

                                                                                      Filesize

                                                                                      9.4MB

                                                                                    • memory/5640-885-0x0000000000400000-0x000000000041D000-memory.dmp

                                                                                      Filesize

                                                                                      116KB

                                                                                    • memory/5648-869-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                      Filesize

                                                                                      320KB

                                                                                    • memory/5648-3953-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                      Filesize

                                                                                      320KB

                                                                                    • memory/5648-954-0x0000000000400000-0x0000000000450000-memory.dmp

                                                                                      Filesize

                                                                                      320KB

                                                                                    • memory/5996-695-0x0000000000400000-0x00000000004DD000-memory.dmp

                                                                                      Filesize

                                                                                      884KB

                                                                                    • memory/6056-730-0x0000000000400000-0x000000000043C000-memory.dmp

                                                                                      Filesize

                                                                                      240KB