Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    493s
  • max time network
    536s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    06/03/2025, 21:11

General

  • Target

    http://temp.sh/ennfh/trash_malware.zip

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Windows security bypass 2 TTPs 3 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables RegEdit via registry modification 1 IoCs
  • Event Triggered Execution: AppInit DLLs 1 TTPs

    Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

  • Possible privilege escalation attempt 2 IoCs
  • Executes dropped EXE 22 IoCs
  • Loads dropped DLL 29 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 4 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 35 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 58 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "http://temp.sh/ennfh/trash_malware.zip"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url http://temp.sh/ennfh/trash_malware.zip
      2⤵
      • Checks processor information in registry
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2576
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1936 -parentBuildID 20240401114208 -prefsHandle 1876 -prefMapHandle 1852 -prefsLen 27661 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5df94961-80b5-4abb-8023-0ae47196617b} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" gpu
        3⤵
          PID:4184
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2364 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2352 -prefsLen 28581 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ae3d486-1acd-4ae5-9e98-1cf288b51e1f} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" socket
          3⤵
          • Checks processor information in registry
          PID:2884
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2624 -childID 1 -isForBrowser -prefsHandle 2644 -prefMapHandle 2812 -prefsLen 22746 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7514922b-30dd-4aeb-92d9-4a464b250fe3} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab
          3⤵
            PID:2716
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3640 -childID 2 -isForBrowser -prefsHandle 3632 -prefMapHandle 3628 -prefsLen 33071 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79897d63-4a13-466d-a765-ab19f0f2b2bb} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab
            3⤵
              PID:1288
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4856 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4840 -prefMapHandle 4624 -prefsLen 33071 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cedc7b39-63a1-462d-b5e3-d782fa2dfe0c} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" utility
              3⤵
              • Checks processor information in registry
              PID:2868
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 3 -isForBrowser -prefsHandle 4256 -prefMapHandle 5428 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d7c599b-63be-4738-843f-70898f816a1d} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab
              3⤵
                PID:3416
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5672 -childID 4 -isForBrowser -prefsHandle 5592 -prefMapHandle 5596 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e0dd28d-88b6-432a-8eb6-291241e8194e} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab
                3⤵
                  PID:2708
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5764 -childID 5 -isForBrowser -prefsHandle 5572 -prefMapHandle 5820 -prefsLen 27145 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7852ef29-0323-4fa8-a536-e56cd6dcd44b} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab
                  3⤵
                    PID:2796
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2616 -childID 6 -isForBrowser -prefsHandle 2664 -prefMapHandle 3008 -prefsLen 27226 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d8ad992-b4c8-43e9-90c0-ffe5bdac9655} 2576 "\\.\pipe\gecko-crash-server-pipe.2576" tab
                    3⤵
                      PID:3404
                • C:\Windows\System32\rundll32.exe
                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                  1⤵
                    PID:920
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\trash_malware\trash malware\stupidy fuckity malware.bat" "
                    1⤵
                      PID:2764
                      • C:\Windows\system32\msg.exe
                        msg * you did a mistake...
                        2⤵
                          PID:4748
                        • C:\Users\Admin\Downloads\trash_malware\trash malware\Zika.exe
                          Zika.exe
                          2⤵
                          • Drops file in Program Files directory
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • NTFS ADS
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4076
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\SwitchAssert.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1148
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1480
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\7-Zip\7z.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:776
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:8
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\7-Zip\7zFM.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2208
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:4408
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\7-Zip\7zG.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:4284
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:3048
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -extract C:\Program Files\7-Zip\Uninstall.dll.sys.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, icongroup,,
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:448
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe" -compile C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res
                            3⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:2960
                          • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe
                            "C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe" -addoverwrite C:\Program Files\7-Zip\Uninstall.exe", "C:\Program Files\7-Zip\Uninstall.exe, C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res, icongroup,,
                            3⤵
                            • Executes dropped EXE
                            • Drops file in Program Files directory
                            • System Location Discovery: System Language Discovery
                            PID:660
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs"
                          2⤵
                            PID:4000
                            • C:\Windows\System32\wscript.exe
                              "C:\Windows\System32\wscript.exe" "C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs" /elevated
                              3⤵
                              • Modifies Control Panel
                              • System policy modification
                              PID:3648
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\IconDance.exe
                            IconDance.exe
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:1624
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\Illerka.C.exe
                            Illerka.C.exe
                            2⤵
                            • UAC bypass
                            • System Location Discovery: System Language Discovery
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2156
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\FreeYoutubeDownloader.exe
                            FreeYoutubeDownloader.exe
                            2⤵
                            • Adds Run key to start application
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:2720
                            • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe
                              "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              PID:2312
                              • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe
                                "C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Box.exe"
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                • Modifies Control Panel
                                • Modifies data under HKEY_USERS
                                PID:3832
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 1240
                                  5⤵
                                  • Loads dropped DLL
                                  • Program crash
                                  PID:4672
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe
                            XPAntivirus2008.exe
                            2⤵
                            • Loads dropped DLL
                            • Adds Run key to start application
                            • Drops file in Program Files directory
                            • System Location Discovery: System Language Discovery
                            PID:4484
                            • C:\Windows\SysWOW64\wscript.exe
                              wscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Antivirus XP 2008.lnk"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4040
                            • C:\Windows\SysWOW64\wscript.exe
                              wscript //B C:\Users\Admin\AppData\Local\Temp\pin.vbs "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008" "Register Antivirus XP 2008.lnk"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2036
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\system32\cmd.exe" /c ocob.bat "C:\Users\Admin\Downloads\trash_malware\trash malware\XPAntivirus2008.exe"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:1672
                            • C:\Program Files (x86)\rhc7v5j0eap5\rhc7v5j0eap5.exe
                              "C:\Program Files (x86)\rhc7v5j0eap5\rhc7v5j0eap5.exe"
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in System32 directory
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: GetForegroundWindowSpam
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              • Suspicious use of SendNotifyMessage
                              • Suspicious use of SetWindowsHookEx
                              PID:920
                              • C:\Windows\SysWOW64\pphc3v5j0eap5.exe
                                "C:\Windows\system32\pphc3v5j0eap5.exe"
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                PID:2872
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPro2017.exe
                            AntivirusPro2017.exe
                            2⤵
                            • Adds Run key to start application
                            • Enumerates connected drives
                            • Writes to the Master Boot Record (MBR)
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            PID:2784
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\HappyAntivirus.exe
                            HappyAntivirus.exe
                            2⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            PID:2476
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\AntivirusPlatinum.exe
                            AntivirusPlatinum.exe
                            2⤵
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:1236
                            • C:\WINDOWS\302746537.exe
                              "C:\WINDOWS\302746537.exe"
                              3⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              PID:2176
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\114D.tmp\302746537.bat" "
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:1104
                                • C:\Windows\SysWOW64\regsvr32.exe
                                  regsvr32 /s c:\windows\comctl32.ocx
                                  5⤵
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  PID:3304
                                • C:\Windows\SysWOW64\regsvr32.exe
                                  regsvr32 /s c:\windows\mscomctl.ocx
                                  5⤵
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Modifies registry class
                                  PID:1012
                                • \??\c:\windows\antivirus-platinum.exe
                                  c:\windows\antivirus-platinum.exe
                                  5⤵
                                  • Windows security bypass
                                  • Disables RegEdit via registry modification
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Windows security modification
                                  • System Location Discovery: System Language Discovery
                                  • Modifies Internet Explorer settings
                                  • Modifies Internet Explorer start page
                                  • Suspicious use of SetWindowsHookEx
                                  • System policy modification
                                  PID:3332
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib +h c:\windows\antivirus-platinum.exe
                                  5⤵
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  • Views/modifies file attributes
                                  PID:1228
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\icons.exe
                            icons.exe
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:5004
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\Bonzify.exe
                            Bonzify.exe
                            2⤵
                            • Loads dropped DLL
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2512
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\KillAgent.bat"
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:4888
                              • C:\Windows\SysWOW64\taskkill.exe
                                taskkill /f /im AgentSvr.exe
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:4776
                              • C:\Windows\SysWOW64\takeown.exe
                                takeown /r /d y /f C:\Windows\MsAgent
                                4⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                • System Location Discovery: System Language Discovery
                                PID:1468
                              • C:\Windows\SysWOW64\icacls.exe
                                icacls C:\Windows\MsAgent /c /t /grant "everyone":(f)
                                4⤵
                                • Possible privilege escalation attempt
                                • Modifies file permissions
                                • System Location Discovery: System Language Discovery
                                PID:2704
                            • C:\Users\Admin\AppData\Local\Temp\INSTALLER.exe
                              INSTALLER.exe /q
                              3⤵
                              • Boot or Logon Autostart Execution: Active Setup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:3880
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s "C:\Windows\msagent\AgentCtl.dll"
                                4⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                PID:1076
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s "C:\Windows\msagent\AgentDPv.dll"
                                4⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:340
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s "C:\Windows\msagent\mslwvtts.dll"
                                4⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                PID:4040
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s "C:\Windows\msagent\AgentDP2.dll"
                                4⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:3576
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s "C:\Windows\msagent\AgentMPx.dll"
                                4⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:3640
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s "C:\Windows\msagent\AgentSR.dll"
                                4⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                PID:3768
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s "C:\Windows\msagent\AgentPsh.dll"
                                4⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                PID:4188
                              • C:\Windows\msagent\AgentSvr.exe
                                "C:\Windows\msagent\AgentSvr.exe" /regserver
                                4⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Modifies registry class
                                PID:4236
                              • C:\Windows\SysWOW64\grpconv.exe
                                grpconv.exe -o
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:2060
                            • C:\Users\Admin\AppData\Local\Temp\INSTALLER.exe
                              INSTALLER.exe /q
                              3⤵
                              • Boot or Logon Autostart Execution: Active Setup
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Adds Run key to start application
                              • Drops file in System32 directory
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:3904
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll
                                4⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:1248
                              • C:\Windows\SysWOW64\regsvr32.exe
                                regsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll
                                4⤵
                                • Loads dropped DLL
                                • System Location Discovery: System Language Discovery
                                PID:2184
                              • C:\Windows\SysWOW64\grpconv.exe
                                grpconv.exe -o
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:3160
                          • C:\Users\Admin\Downloads\trash_malware\trash malware\mbrsetup.exe
                            "C:\Users\Admin\Downloads\trash_malware\trash malware\mbrsetup.exe"
                            2⤵
                            • UAC bypass
                            • Executes dropped EXE
                            • Checks whether UAC is enabled
                            • System Location Discovery: System Language Discovery
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • System policy modification
                            PID:2332
                        • C:\Windows\msagent\AgentSvr.exe
                          C:\Windows\msagent\AgentSvr.exe -Embedding
                          1⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          PID:1852
                        • C:\Windows\system32\AUDIODG.EXE
                          C:\Windows\system32\AUDIODG.EXE 0x00000000000004BC 0x00000000000004E0
                          1⤵
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1480
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Enumerates connected drives
                          • Checks SCSI registry key(s)
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: GetForegroundWindowSpam
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of FindShellTrayWindow
                          • Suspicious use of SendNotifyMessage
                          • Suspicious use of SetWindowsHookEx
                          PID:4116
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                          • Suspicious use of SetWindowsHookEx
                          PID:3328
                        • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe
                          "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca
                          1⤵
                          • Enumerates system info in registry
                          • Modifies Internet Explorer settings
                          • Modifies registry class
                          • Suspicious use of SetWindowsHookEx
                          PID:704
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3832 -ip 3832
                          1⤵
                          • Loads dropped DLL
                          PID:4260
                        • C:\Windows\system32\LogonUI.exe
                          "LogonUI.exe" /flags:0x4 /state0:0xa39f7855 /state1:0x41c64e6d
                          1⤵
                            PID:4216
                          • C:\Windows\System32\smss.exe
                            \SystemRoot\System32\smss.exe 00000148 0000008c
                            1⤵
                              PID:3832

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Program Files (x86)\rhc7v5j0eap5\rhc7v5j0eap5.exe

                              Filesize

                              9.0MB

                              MD5

                              04b88c7067b53a9bdf844cd1cb4b9c30

                              SHA1

                              7d081a1053cd9ef3d593f5ef9a27303824b779f5

                              SHA256

                              d42b135a1e70b6f7d0d98c340f4b529f722953cf57e573bb21a078f50f2016b9

                              SHA512

                              566f36f804d3027daab0e01f6d816b0420ba21fc276f2fabda4d0ed37b0e830704dcba8ccc3d30a7023c69f8ad3da0b9b58a49a26b3bb239d8ae0762bc157a42

                            • C:\Program Files\7-Zip\7z.dll.sys.exe

                              Filesize

                              549KB

                              MD5

                              0b24892597dcb0257cdb78b5ed165218

                              SHA1

                              5fe5d446406ff1e34d2fe3ee347769941636e323

                              SHA256

                              707f415d7d581edd9bce99a0429ad4629d3be0316c329e8b9ebd576f7ab50b71

                              SHA512

                              24ea9e0f10a283e67850070976c81ae4b2d4d9bb92c6eb41b2557ad3ae02990287531a619cf57cd257011c6770d4c25dd19c3c0e46447eb4d0984d50d869e56f

                            • C:\Program Files\7-Zip\7zFM.dll.sys.exe

                              Filesize

                              963KB

                              MD5

                              004d7851f74f86704152ecaaa147f0ce

                              SHA1

                              45a9765c26eb0b1372cb711120d90b5f111123b3

                              SHA256

                              028cf2158df45889e9a565c9ce3c6648fb05c286b97f39c33317163e35d6f6be

                              SHA512

                              16ebda34803977a324f5592f947b32f5bb2362dd520dc2e97088d12729024498ddfa6800694d37f2e6e5c6fc8d4c6f603414f0c033df9288efc66a2c39b5ec29

                            • C:\Program Files\7-Zip\7zFM.exe

                              Filesize

                              5.6MB

                              MD5

                              40228458ca455d28e33951a2f3844209

                              SHA1

                              86165eb8eb3e99b6efa25426508a323be0e68a44

                              SHA256

                              1a904494bb7a21512af6013fe65745e7898cdd6fadac8cb58be04e02346ed95f

                              SHA512

                              da62cc244f9924444c7cb4fdbd46017c65e6130d639f6696f7930d867017c211df8b18601bfdaaee65438cee03977848513d7f08987b9b945f3f05241f55ec39

                            • C:\Program Files\7-Zip\7zG.dll.sys.exe

                              Filesize

                              692KB

                              MD5

                              4159ff3f09b72e504e25a5f3c7ed3a5b

                              SHA1

                              b79ab2c83803e1d6da1dcd902f41e45d6cd26346

                              SHA256

                              0163ec83208b4902a2846de998a915de1b9e72aba33d98d5c8a14a8fbf0f6101

                              SHA512

                              48f54f0ab96be620db392b4c459a49a0fa8fbe95b1c1b7df932de565cf5f77adfaae98ef1e5998f326172b5ae4ffa9896aeac0f7b98568fcde6f7b1480df4e2d

                            • C:\Program Files\7-Zip\Uninstall.dll.sys.exe

                              Filesize

                              14KB

                              MD5

                              5dfdda860ba69df0ae0ab193cf22a4ad

                              SHA1

                              631c3b573b87688a9c5c5f9268fa826b315acb22

                              SHA256

                              2ffa1c010889dc2c03dfef2271343ac6032c3966530c383b92d3dfd99a3aadc5

                              SHA512

                              ba844e4157d1da80879d89d52155e10f02682f34d92a5a7a57fb1d723cac66b01ff3aace379072780c01720419fd21f1f25279f6587950e9ed4c43688c284a95

                            • C:\Program Files\7-Zip\Uninstall.exe

                              Filesize

                              5.6MB

                              MD5

                              28cab2224580a30e19000b0148499752

                              SHA1

                              c7a717b2c014cf16333a74fafa77ad9f2a459198

                              SHA256

                              497fb02861144fb4abeec83f3dab727675ea91c827b6492e5633992ad2db61c7

                              SHA512

                              7d26a529a321f764bcdc269223dab89e71e2034b7f06e7700255c3c48a8f7eb0248c96f61524811e5631d16b18a51eb98e496977cd8ed9eac1f136c0f811ae1d

                            • C:\Program Files\7-Zip\Uninstall.exe:Zone.Identifier

                              Filesize

                              82B

                              MD5

                              4b8cbdf2780f2a8407e5f0d734ee908d

                              SHA1

                              a5ee1e7fb8b7ec54537f282b3fddf491a8417b47

                              SHA256

                              770445a34792447c2856712254b18adbaeaf3c1c66b56c3df7a1d2fc73984738

                              SHA512

                              01a3278dba5a59fbcb13fdecf004969b979b91fa18fdad386e5aa23973fb66303cc3f85bf03879a01f6ad9f085d0ce5a544c1693c7133030871f9d653a71b570

                            • C:\Program Files\SwitchAssert.dll.sys.exe

                              Filesize

                              230KB

                              MD5

                              0edd97321de3fe148603eadd7a746af4

                              SHA1

                              fa32a8e3bddbc6061eab62233c80fc9400e8bdd9

                              SHA256

                              8f0ad4593609d723c870cf7dffefa4e86be5f42217499299e7bfd618e32d1180

                              SHA512

                              6ac3ac951c4ed96e9e0b3e3ea2d93122154b3481d48591f7e5eaf06ba641fbdbc38cb7b5f4e47acb38fe3705bea81e2f23312ebe7e5954086a9b0c585481e235

                            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\Antivirus XP 2008.lnk

                              Filesize

                              1KB

                              MD5

                              2a6fd455ca0480e1f4d5d7dca1abb363

                              SHA1

                              fd1eeece1d77079fa7afe8e41889eac9fdc09199

                              SHA256

                              59a31b0c6dfdbeb16b933616da379b8c5c992c33e06da024d9ad11dcde2d53a5

                              SHA512

                              cddc4d3517748a9bb26a28d0e50211fa75825168100c79624987985ae1e6978d596d326e4a4bb3f85016d0b43f23b1267377bbe778be07acd86731ebb8ebbcb9

                            • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Antivirus XP 2008\Register Antivirus XP 2008.lnk

                              Filesize

                              1KB

                              MD5

                              2b393158a6aa75b04ae36efd8cc9be1d

                              SHA1

                              079445fda3a3a9bf4681d1c831a62ba303d60f75

                              SHA256

                              a61cc9b194b51bf86e3f31b866f8a95d95bd3a6f7a96efa028077fb3cdf89630

                              SHA512

                              8cc48289f7782432eb1c13cf0d6c010d5d8de13dee1748fba40611619e648c388f111e5dbea4f470e3f83c2fa288579ef8d32b4168ac28f0d8ecc05dd7c526c7

                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\activity-stream.discovery_stream.json

                              Filesize

                              21KB

                              MD5

                              61b80e322ff36812cc3d96bafdafa93e

                              SHA1

                              ca8ca0b580434f8d604db47ec6376d51a1acf0bc

                              SHA256

                              75509de07f1ea9ea2e731aef27b97010c4fa0cdc4d5fe9420cdec89c33bd9c17

                              SHA512

                              6ae235bced80972a1565f1a67061d597304c2f6cde94dd34ea247709382ec7c4daa2ee4ef8d991006d23627454849ff55982605eb633767590e4dbed7d2624f9

                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml

                              Filesize

                              325B

                              MD5

                              b13bd4ddc31ec0b715c2f395af60c2c2

                              SHA1

                              61f7708c620a6586864100a64894f31ffcd289aa

                              SHA256

                              0408078a01c3bba6ae9e6bbe2885f7699b1baf2d1a9b8f0d45f6a67bb2128d18

                              SHA512

                              20520a89460d1c25f8193800414ad73116d03ccc91461ab8b39184a886edf904f0cf14dba47c0a316d91137dd3caa4c03f0fc9501311f332c0bd29a4fd6fa4ca

                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml

                              Filesize

                              15KB

                              MD5

                              a276a2ce0182aa437375819b54693802

                              SHA1

                              2034dd9bda470fb317a794ad5ac66b78255dade7

                              SHA256

                              35a0dc4cc4f103cefef078505ca2df2e74c6ddf6d63ec01c084c6643245e1bb4

                              SHA512

                              3d9d86878d4529e58b40be52b1761c4a228cce2fcd29f483b188871ba3909af07cfb16d52e3cf16d09cde295b6544427cceb6bbb5e80f240adcffbb2d942ce9b

                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml

                              Filesize

                              19KB

                              MD5

                              762786b301657578d4a622f4ed3b8a92

                              SHA1

                              252870aa55e0df62b8dabc11b715141e7ba734f2

                              SHA256

                              759172fb6b239501764fffadf01dc341a32c16def76c091a1b3e0127e2dc2ec8

                              SHA512

                              bb19f369402a0f2fcb6557e7279ca4e8370c96c05d746eec7035ad86a83613878fc4efb30af5bd45dea35b6a4321a42faf7553f88259bffd27abe631a17f97e2

                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml

                              Filesize

                              9KB

                              MD5

                              43c9149bfd672138047974c6406fef37

                              SHA1

                              1a84a1dde9cadea097b7d4dc88456d4dfced79be

                              SHA256

                              d11197856d6291584537693699050c10d27dd3809a5a5045c87b87355ef9ace1

                              SHA512

                              3f5391de954ef19fd0b5508135a7db9a3cf01a8ae81ce4fbc95a1de70fbd3a1ad6587c06e8dcf258f34d7aac6a6b9423e686cc42b8cccb8434e08b7c2faa3a7d

                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\27KPFAUE\www.bing[1].xml

                              Filesize

                              10KB

                              MD5

                              db5fc5820684f21e3da28868855dd28f

                              SHA1

                              e1867bf828ca84736220cd423984a389b49fb034

                              SHA256

                              d080c7740bb4f3959cb1ecc1d87ebcfd0a509690b9eae13110ae9b5a93bea06f

                              SHA512

                              d034de791c036faead8a32207eea813543caaafa8e8c6cbc21b5cb690da0cc12b61e029b95342af7fc2369fadc53ab1115371a7e45220953e7a1f58d4432a1d4

                            • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133857694617734781.txt

                              Filesize

                              88KB

                              MD5

                              314411f9b543b5bec804add4ee6b2dce

                              SHA1

                              a584cb557d7592840c056d906fa89078021080d6

                              SHA256

                              43e327f77d508eb79c789d78554757fcd782d6b52fdc27070933c35d547fc839

                              SHA512

                              3a1471e573a25100281d305b4f317202d5b0428d0becd80ea6f99fee20d1fb92d17b9aa6bbe51f336b12a08002715e374d74e9ccc90a4500ad79d1605d36d9c6

                            • C:\Users\Admin\AppData\Local\Temp\114D.tmp\302746537.bat

                              Filesize

                              348B

                              MD5

                              7d8beb22dfcfacbbc2609f88a41c1458

                              SHA1

                              52ec2b10489736b963d39a9f84b66bafbf15685f

                              SHA256

                              4aa9ed4b38514f117e6e4f326cb0a1be7f7b96199e21305e2bd6dce289d7baa2

                              SHA512

                              a26cf9168cf7450435a9fe8942445511f6fda1087db52bd73e335d6f5b544fc892999019d9291d9dcc60c3656de49688f6d63282c97706e2db286f988e44fd94

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\Icon_1.ico

                              Filesize

                              1KB

                              MD5

                              0e581dbc510cb867773d322c22275703

                              SHA1

                              e77c65e5afa7147740b9153a536ac6e7fcb8a6e0

                              SHA256

                              498446f91da7facd85ec64a4b009ebd3b37df82ed8ea72634f853887689cf6d9

                              SHA512

                              ce16d74e3b90bd68f407b9269c755c53960d74b6234a775e05960ebfc3655098972bde2f2c6786060bb421de2e5fec889c1b3b3493215000e2e4af5fda6918e8

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.rc

                              Filesize

                              23B

                              MD5

                              0242dcc2276a78bad128831c3658e05d

                              SHA1

                              7f1cbfe2bbe0a88839b5bb988d83aab24b6af559

                              SHA256

                              efd2129c933ee2233bf7fc74e640c0b01d9aee82a9bd08088528fe366c2d77c8

                              SHA512

                              ac308ec35d4b9e3c3b4e3ce57c1459158f2f82cf0999f4a7b99c58f2431c9e096c59f493285e4f0331430ab3cc22e4d17c35791e21b177384d0f770ab053eb79

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res

                              Filesize

                              32B

                              MD5

                              45d02203801ec5cae86ed0a68727b0fa

                              SHA1

                              1b22a6df3fc0ef23c6c5312c937db7c8c0df6703

                              SHA256

                              5e743f477333066c29c3742cc8f9f64a8cb9c54b71dbc8c69af5025d31f8c121

                              SHA512

                              8da0bf59066223aab96595c9fbf8532baa34f1f9c2c0dee674d310a82677b6c7d6a1cc0bbaa75262b986d2b805b049ec3a2bfb25a9ae30fe6d02e32660f15e83

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\icons.res

                              Filesize

                              1KB

                              MD5

                              2283046ca6c89d23349a4ed76964e188

                              SHA1

                              786a12ad143db960a78ee4e926c6db0153da4245

                              SHA256

                              ed680a08263dbb1e2a66f9d41e6f2bba9a5a6805ce178326d9af1d3316c9e135

                              SHA512

                              f5fb87e4fc3d75471a31302f2c68fb6ac82d5fe691b81dafe3a11a17fcd9ca5cb5ee68b96d61ee306cded4ee371df4024fcc2beac882111825053ca3c2d8ab02

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.exe

                              Filesize

                              861KB

                              MD5

                              66064dbdb70a5eb15ebf3bf65aba254b

                              SHA1

                              0284fd320f99f62aca800fb1251eff4c31ec4ed7

                              SHA256

                              6a94dbda2dd1edcff2331061d65e1baf09d4861cc7ba590c5ec754f3ac96a795

                              SHA512

                              b05c6c09ae7372c381fba591c3cb13a69a2451b9d38da1a95aac89413d7438083475d06796acb5440cd6ec65b030c9fa6cbdaa0d2fe91a926bae6499c360f17f

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.ini

                              Filesize

                              206B

                              MD5

                              b48b020c9c2caec91395e91dd63084fc

                              SHA1

                              9d19f13d305e96401c71ab5713e78b1361e8c863

                              SHA256

                              a24d6e63a73c09eb70e1c64396971ed3c2fbdec55bbd5918b546ea8f83b97dcc

                              SHA512

                              ded7ab614a47afec17e3fae1086e84820102b928a098460bdad03d085ceeb7642bfb093b3ef67da06ec84896ae130f432d1ce0105d30b90942bdeefd4dd3fa77

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.ini

                              Filesize

                              291B

                              MD5

                              1f52db17f80c124651768699d3d1b860

                              SHA1

                              2d406c8618c081edb9f1c52a27209dec1d97efbb

                              SHA256

                              1fc04ee98599501190512c0955db92aa999bc5d5560f1613c748186c69289c7b

                              SHA512

                              c997e7ac2de050af1cdf5fe6260c7b6b5e526134d2308481286abee1298eb5a29652f5d71f191bf57dc102bebdbb7befe657da8ca05cec66c42ded403c65624c

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.ini

                              Filesize

                              330B

                              MD5

                              86aae7a4d3a13c75b6dbc1df6dc15ba6

                              SHA1

                              eb63c3ddcf0b705e1642e4606571294c79c5fb3d

                              SHA256

                              07d2f7be8e428409947ccdacf4923949471a4f7f2365bc29b51023f5877a4670

                              SHA512

                              cad63bf6128dcd50ca43323fe63488a4182625c452fba21fef493c7168d54dd9c77b0b2475e6996c4425c689a0b2a1197b2a88cf375fb37b79769ae21e510d65

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.ini

                              Filesize

                              368B

                              MD5

                              f38779b0e0901cc3ca0227afa23c2b11

                              SHA1

                              ad18329b4d6da4d9c50e3fad838f728eefee452a

                              SHA256

                              e4a48f24bbfed51077954f72f78c81bc1f3ccaa9c528ca19d814fa21a9fa9956

                              SHA512

                              4ec1293f4de905c04a5f431fc3bf893ad0c5ee93f5d1de856248361ef6b2182c2f26df73ec65c059848383903702f542ac6cca4812d658210297e123cf1036ef

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.ini

                              Filesize

                              412B

                              MD5

                              95e185c9f35253c766fd409ed9fdf9ef

                              SHA1

                              82e3274a524f8defcaa3f5ac18c25f2b7ec54da4

                              SHA256

                              c4f56da20697c54fd3f0d59f7ca563be4f1cea72959a84bb91169463c641d459

                              SHA512

                              97b2c38cda1f94ffcd1125dd8d307ca1c584e796abd161730a76455688c35821d4794c0d09ffe6d81cff161f5c135c11d8cf8f0c8f675ac0f4649c278abcbbf5

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.ini

                              Filesize

                              411B

                              MD5

                              00281c9c151a2cc71957e5fe508ccb9b

                              SHA1

                              7fbcc231253c818736069a89092e742333b9def0

                              SHA256

                              8dc2045dd81dc8274c2445daa71a858bb3adba4bebc522779d397d7df9492099

                              SHA512

                              f6a0da702cedb437bfc5eccca2045c0f740a71614629c35cb5bcf134d9359f65a05100e60eb31c2bbc211984a1f4d6a2425ac47bb7cb59166c4ed73e58d1cdf6

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.log

                              Filesize

                              244B

                              MD5

                              8038f8d15477a4206219bb3403bebe0c

                              SHA1

                              3ad9f6b8c9ca835c53cbeb20c027dc6e67da4227

                              SHA256

                              f9bbe4d97a3514d3fac776692df0eec1dc58d1d18aa0b6cebabed8079101669e

                              SHA512

                              6e3ec1040e7322dc2c49f8c8dcbf4d9ffdd70ceadc5e7110739f9a527f7e94926d084929bc815ef9d2f454245e5906f05dec55aa05a1fb90a46b25f94c2f2d57

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.log

                              Filesize

                              246B

                              MD5

                              b2a34bc949630ff72528f3b3d178670f

                              SHA1

                              4af85fcd27e72d1c3b6ca14d69a0142b7c125fc1

                              SHA256

                              07eef2ff78f4574409072f66cb37d4ac70a5dd0144f154530223673ae3d0c26d

                              SHA512

                              283b3d99fd78ff4a5b69180aa39f85ea37b889d8a805421c1030172496c43eaaf50694ffceaed581666fb4448a1039bb60bb8798ac339c25d3170d027dd8c3e0

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.log

                              Filesize

                              245B

                              MD5

                              767888066400df872ed492fc3977de3f

                              SHA1

                              71af3fde52b893b084e7f99dd3e855bca91c32c1

                              SHA256

                              36223bc20d9b22058d58510664bb200de1c92622e4282d5198d4cac711e9239e

                              SHA512

                              4907ccef6aca834eefb3733f78e6cad9393b23145a561b35ff389a66148d5a28df2e7dfdf26debce9c493c96c03ea61be420e6e8d7cd958c070523631ae1b2b7

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.log

                              Filesize

                              251B

                              MD5

                              2505bcd31229a3beb5022ce3f14cedb1

                              SHA1

                              d8cf8d9bb9317baa22fc9268b03aab85ae9b9d3d

                              SHA256

                              a6cfdbdb626233abdde9806d9756d711866ef8cb390d6035a0f922998fa2ec6f

                              SHA512

                              7f8d57205063c7bf0464a280bec1962282ab521ae42789ed380654e8fddaab11f379565753b0677039ee923c4acd23839bf51c469199b0566b42fc6132c1b50f

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.log

                              Filesize

                              289B

                              MD5

                              9ed10b7cd77392819c352e4dd36a97c8

                              SHA1

                              66cb643132e6a965f89a9f4735c66410f2ec143e

                              SHA256

                              0e9f2b5d66e6f9fec435809c9d132c6addce6487e3b21ba88bafc0ed43b9d7bf

                              SHA512

                              4dca1198d44617a671f8df54bba025144d4857ae3e21a246b6d3327c820722ea03bc1c587bee324c8c280c0c074430701b66630d3cbf8718f258f92fa33558e4

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\svchost.log

                              Filesize

                              335B

                              MD5

                              2db91ca5154ddd31c0ebfa848b8a8ea8

                              SHA1

                              274b9d83734dccd2a1dd1bcb2f8e42f2c8342675

                              SHA256

                              f254e4edba8d31d5eab3074d1a3afa44aa968ec0d42fb53738bf76a3b3a79388

                              SHA512

                              81e9a0668508514d532a3aa0b6395befa75e6216796279ec2421fc9e49068bb199ee8a55c2e1060e459e76e012a45b5df653f4bb05839e917ffbc235f0ee8092

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.exe

                              Filesize

                              4.1MB

                              MD5

                              c6391727ae405fb9812a8ad2a7729402

                              SHA1

                              83693dc297392c6a28f7f16d23414c6d62921711

                              SHA256

                              d98fbfca17f194400d19111e4813340e6666b254b99f833739b661a4d2d0217c

                              SHA512

                              7a4e2ff93d853415d433f5e90b36959c78b77590aa1fa00753831eb4d01cb1a972bb9e39eb8dee5b216005e7709eacda51c0c410aacfe37fcdb163603fd36570

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.ini

                              Filesize

                              44B

                              MD5

                              dbfea325d1e00a904309a682051778ad

                              SHA1

                              525562934d0866f2ba90b3c25ea005c8c5f1e9fb

                              SHA256

                              15a3a3303b4a77272ddb04454333a4c06aa2a113f210ba4a03314026e0821e6d

                              SHA512

                              cd853c67c2b1a44c3f592ff42d207b2251e8b9bc1eb22fc12cd710329069ef75abffccd169418c4f9bd008a40f2fbbfc6904519f27fd658f316309f94b8ff59c

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.log

                              Filesize

                              716B

                              MD5

                              f515966525b6a041868fd228a940c19f

                              SHA1

                              7d7373749755b1c8bb4377bde376f9867b9b8f8c

                              SHA256

                              870cd2fa48302fe69df91781bb6e9bab65a86b9916f204f185b248634711c55b

                              SHA512

                              a06cb6f10df9a86483c3909c2bce33c7905c5a9d48113142d6cb946ded576ba2e57b63c01a5c674e0c95ddc359c5fb6bfa0ba928063332ec20cc365071780797

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.log

                              Filesize

                              716B

                              MD5

                              fdaf8b4743cd0db88b950bd242b41b4c

                              SHA1

                              9c222aa5748dadf3438d8358abc72e1650a26346

                              SHA256

                              e4a2ab93d143159e161e9f4300bbd1135e116ea2bf01472db163f8f2ce361398

                              SHA512

                              a2317bdb68d607e14937f5f658dd011912e5b6be482af95c683c2b7be7c311fad6ddf686d61bd868712946d66139e3efec7648e809ba43886431c1aaf908e754

                            • C:\Users\Admin\AppData\Local\Temp\745ae76272784fe7857087bd5f32a7cc\taskhost.log

                              Filesize

                              716B

                              MD5

                              c85ddff1120753e89c979be3dd4e81a2

                              SHA1

                              d401ec1436012ddd70b5934d1dbee08cc8e9e4fc

                              SHA256

                              a49f6760ba3765583b09a40e8ef8c319eff2038e9749cc177f4cc0e0647c661a

                              SHA512

                              1899fd05471154162637c90b3af042c2eda270408aa0e1e33fb98494d7afc430b6d5c34149ed822541d32174b09e720d0da569af2f4eb2fc416720e23554dcde

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL

                              Filesize

                              73KB

                              MD5

                              81e5c8596a7e4e98117f5c5143293020

                              SHA1

                              45b7fe0989e2df1b4dfd227f8f3b73b6b7df9081

                              SHA256

                              7d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004

                              SHA512

                              05b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTANM.DLL

                              Filesize

                              40KB

                              MD5

                              48c00a7493b28139cbf197ccc8d1f9ed

                              SHA1

                              a25243b06d4bb83f66b7cd738e79fccf9a02b33b

                              SHA256

                              905cb1a15eccaa9b79926ee7cfe3629a6f1c6b24bdd6cea9ccb9ebc9eaa92ff7

                              SHA512

                              c0b0a410ded92adc24c0f347a57d37e7465e50310011a9d636c5224d91fbc5d103920ab5ef86f29168e325b189d2f74659f153595df10eef3a9d348bb595d830

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTCTL.DLL

                              Filesize

                              160KB

                              MD5

                              237e13b95ab37d0141cf0bc585b8db94

                              SHA1

                              102c6164c21de1f3e0b7d487dd5dc4c5249e0994

                              SHA256

                              d19b6b7c57bcee7239526339e683f62d9c2f9690947d0a446001377f0b56103a

                              SHA512

                              9d0a68a806be25d2eeedba8be1acc2542d44ecd8ba4d9d123543d0f7c4732e1e490bad31cad830f788c81395f6b21d5a277c0bed251c9854440a662ac36ac4cb

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTDP2.DLL

                              Filesize

                              60KB

                              MD5

                              a334bbf5f5a19b3bdb5b7f1703363981

                              SHA1

                              6cb50b15c0e7d9401364c0fafeef65774f5d1a2c

                              SHA256

                              c33beaba130f8b740dddb9980fe9012f9322ac6e94f36a6aa6086851c51b98de

                              SHA512

                              1fa170f643054c0957ed1257c4d7778976c59748670afa877d625aaa006325404bc17c41b47be2906dd3f1e229870d54eb7aba4a412de5adedbd5387e24abf46

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTDPV.DLL

                              Filesize

                              64KB

                              MD5

                              7c5aefb11e797129c9e90f279fbdf71b

                              SHA1

                              cb9d9cbfbebb5aed6810a4e424a295c27520576e

                              SHA256

                              394a17150b8774e507b8f368c2c248c10fce50fc43184b744e771f0e79ecafed

                              SHA512

                              df59a30704d62fa2d598a5824aa04b4b4298f6192a01d93d437b46c4f907c90a1bad357199c51a62beb87cd724a30af55a619baef9ecf2cba032c5290938022a

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTMPX.DLL

                              Filesize

                              60KB

                              MD5

                              4fbbaac42cf2ecb83543f262973d07c0

                              SHA1

                              ab1b302d7cce10443dfc14a2eba528a0431e1718

                              SHA256

                              6550582e41fc53b8a7ccdf9ac603216937c6ff2a28e9538610adb7e67d782ab5

                              SHA512

                              4146999b4bec85bcd2774ac242cb50797134e5180a3b3df627106cdfa28f61aeea75a7530094a9b408bc9699572cae8cf998108bde51b57a6690d44f0b34b69e

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTPSH.DLL

                              Filesize

                              36KB

                              MD5

                              b4ac608ebf5a8fdefa2d635e83b7c0e8

                              SHA1

                              d92a2861d5d1eb67ab434ff2bd0a11029b3bd9a9

                              SHA256

                              8414dfe399813b7426c235ba1e625bd2b5635c8140da0d0cfc947f6565fe415f

                              SHA512

                              2c42daade24c3ff01c551a223ee183301518357990a9cb2cc2dd7bf411b7059ff8e0bf1d1aee2d268eca58db25902a8048050bdb3cb48ae8be1e4c2631e3d9b4

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTSR.DLL

                              Filesize

                              60KB

                              MD5

                              9fafb9d0591f2be4c2a846f63d82d301

                              SHA1

                              1df97aa4f3722b6695eac457e207a76a6b7457be

                              SHA256

                              e78e74c24d468284639faf9dcfdba855f3e4f00b2f26db6b2c491fa51da8916d

                              SHA512

                              ac0d97833beec2010f79cb1fbdb370d3a812042957f4643657e15eed714b9117c18339c737d3fd95011f873cda46ae195a5a67ae40ff2a5bcbee54d1007f110a

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTSVR.EXE

                              Filesize

                              268KB

                              MD5

                              5c91bf20fe3594b81052d131db798575

                              SHA1

                              eab3a7a678528b5b2c60d65b61e475f1b2f45baa

                              SHA256

                              e8ce546196b6878a8c34da863a6c8a7e34af18fb9b509d4d36763734efa2d175

                              SHA512

                              face50db7025e0eb2e67c4f8ec272413d13491f7438287664593636e3c7e3accaef76c3003a299a1c5873d388b618da9eaede5a675c91f4c1f570b640ac605d6

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT0409.DLL

                              Filesize

                              28KB

                              MD5

                              0cbf0f4c9e54d12d34cd1a772ba799e1

                              SHA1

                              40e55eb54394d17d2d11ca0089b84e97c19634a7

                              SHA256

                              6b0b57e5b27d901f4f106b236c58d0b2551b384531a8f3dad6c06ed4261424b1

                              SHA512

                              bfdb6e8387ffbba3b07869cb3e1c8ca0b2d3336aa474bd19a35e4e3a3a90427e49b4b45c09d8873d9954d0f42b525ed18070b949c6047f4e4cdb096f9c5ae5d5

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT0409.HLP

                              Filesize

                              8KB

                              MD5

                              466d35e6a22924dd846a043bc7dd94b8

                              SHA1

                              35e5b7439e3d49cb9dc57e7ef895a3cd8d80fb10

                              SHA256

                              e4ccf06706e68621bb69add3dd88fed82d30ad8778a55907d33f6d093ac16801

                              SHA512

                              23b64ed68a8f1df4d942b5a08a6b6296ec5499a13bb48536e8426d9795771dbcef253be738bf6dc7158a5815f8dcc65feb92fadf89ea8054544bb54fc83aa247

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT20.INF

                              Filesize

                              2KB

                              MD5

                              e4a499b9e1fe33991dbcfb4e926c8821

                              SHA1

                              951d4750b05ea6a63951a7667566467d01cb2d42

                              SHA256

                              49e6b848f5a708d161f795157333d7e1c7103455a2f47f50895683ef6a1abe4d

                              SHA512

                              a291bb986293197a16f75b2473297286525ac5674c08a92c87b5cc1f0f2e62254ea27d626b30898e7857281bdb502f188c365311c99bda5c2dd76da0c82c554a

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGTCTL15.TLB

                              Filesize

                              28KB

                              MD5

                              f1656b80eaae5e5201dcbfbcd3523691

                              SHA1

                              6f93d71c210eb59416e31f12e4cc6a0da48de85b

                              SHA256

                              3f8adc1e332dd5c252bbcf92bf6079b38a74d360d94979169206db34e6a24cd2

                              SHA512

                              e9c216b9725bd419414155cfdd917f998aa41c463bc46a39e0c025aa030bc02a60c28ac00d03643c24472ffe20b8bbb5447c1a55ff07db3a41d6118b647a0003

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGTINST.INF

                              Filesize

                              7KB

                              MD5

                              b127d9187c6dbb1b948053c7c9a6811f

                              SHA1

                              b3073c8cad22c87dd9b8f76b6ffd0c4d0a2010d9

                              SHA256

                              bd1295d19d010d4866c9d6d87877913eee69e279d4d089e5756ba285f3424e00

                              SHA512

                              88e447dd4db40e852d77016cfd24e09063490456c1426a779d33d8a06124569e26597bb1e46a3a2bbf78d9bffee46402c41f0ceb44970d92c69002880ddc0476

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSLWVTTS.DLL

                              Filesize

                              52KB

                              MD5

                              316999655fef30c52c3854751c663996

                              SHA1

                              a7862202c3b075bdeb91c5e04fe5ff71907dae59

                              SHA256

                              ea4ca740cd60d2c88280ff8115bf354876478ef27e9e676d8b66601b4e900ba0

                              SHA512

                              5555673e9863127749fc240f09cf3fb46e2019b459ad198ba1dc356ba321c41e4295b6b2e2d67079421d7e6d2fb33542b81b0c7dae812fe8e1a87ded044edd44

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Msvcirt.dll

                              Filesize

                              76KB

                              MD5

                              e7cd26405293ee866fefdd715fc8b5e5

                              SHA1

                              6326412d0ea86add8355c76f09dfc5e7942f9c11

                              SHA256

                              647f7534aaaedffa93534e4cb9b24bfcf91524828ff0364d88973be58139e255

                              SHA512

                              1114c5f275ecebd5be330aa53ba24d2e7d38fc20bb3bdfa1b872288783ea87a7464d2ab032b542989dee6263499e4e93ca378f9a7d2260aebccbba7fe7f53999

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Msvcp50.dll

                              Filesize

                              552KB

                              MD5

                              497fd4a8f5c4fcdaaac1f761a92a366a

                              SHA1

                              81617006e93f8a171b2c47581c1d67fac463dc93

                              SHA256

                              91cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a

                              SHA512

                              73d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W95INF16.DLL

                              Filesize

                              2KB

                              MD5

                              7210d5407a2d2f52e851604666403024

                              SHA1

                              242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9

                              SHA256

                              337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af

                              SHA512

                              1755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\W95INF32.DLL

                              Filesize

                              4KB

                              MD5

                              4be7661c89897eaa9b28dae290c3922f

                              SHA1

                              4c9d25195093fea7c139167f0c5a40e13f3000f2

                              SHA256

                              e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5

                              SHA512

                              2035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\andmoipa.ttf

                              Filesize

                              29KB

                              MD5

                              c3e8aeabd1b692a9a6c5246f8dcaa7c9

                              SHA1

                              4567ea5044a3cef9cb803210a70866d83535ed31

                              SHA256

                              38ae07eeb7909bda291d302848b8fe5f11849cf0d597f0e5b300bfed465aed4e

                              SHA512

                              f74218681bd9d526b68876331b22080f30507898b6a6ebdf173490ca84b696f06f4c97f894cb6052e926b1eee4b28264db1ead28f3bc9f627b4569c1ddcd2d3e

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv_enua.dll

                              Filesize

                              1.2MB

                              MD5

                              ed98e67fa8cc190aad0757cd620e6b77

                              SHA1

                              0317b10cdb8ac080ba2919e2c04058f1b6f2f94d

                              SHA256

                              e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d

                              SHA512

                              ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv_enua.hlp

                              Filesize

                              11KB

                              MD5

                              80d09149ca264c93e7d810aac6411d1d

                              SHA1

                              96e8ddc1d257097991f9cc9aaf38c77add3d6118

                              SHA256

                              382d745e10944b507a8d9c69ae2e4affd4acf045729a19ac143fa8d9613ccb42

                              SHA512

                              8813303cd6559e2cc726921838293377e84f9b5902603dac69d93e217ff3153b82b241d51d15808641b5c4fb99613b83912e9deda9d787b4c8ccfbd6afa56bc9

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tv_enua.inf

                              Filesize

                              2KB

                              MD5

                              0a250bb34cfa851e3dd1804251c93f25

                              SHA1

                              c10e47a593c37dbb7226f65ad490ff65d9c73a34

                              SHA256

                              85189df1c141ef5d86c93b1142e65bf03db126d12d24e18b93dd4cc9f3e438ae

                              SHA512

                              8e056f4aa718221afab91c4307ff87db611faa51149310d990db296f979842d57c0653cb23d53fea54a69c99c4e5087a2eb37daa794ba62e6f08a8da41255795

                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\tvenuax.dll

                              Filesize

                              40KB

                              MD5

                              1587bf2e99abeeae856f33bf98d3512e

                              SHA1

                              aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9

                              SHA256

                              c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0

                              SHA512

                              43161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a

                            • C:\Users\Admin\AppData\Local\Temp\KillAgent.bat

                              Filesize

                              161B

                              MD5

                              ea7df060b402326b4305241f21f39736

                              SHA1

                              7d58fb4c58e0edb2ddceef4d21581ff9d512fdc2

                              SHA256

                              e4edc2cb6317ab19ee1a6327993e9332af35cfbebaff2ac7c3f71d43cfcbe793

                              SHA512

                              3147615add5608d0dce7a8b6efbfb19263c51a2e495df72abb67c6db34f5995a27fde55b5af78bbd5a6468b4065942cad4a4d3cb28ab932aad9b0f835aafe4d0

                            • C:\Users\Admin\AppData\Local\Temp\nsr77.tmp\KillSelf.dll

                              Filesize

                              5KB

                              MD5

                              8b49e96b0bd0fe3822bd4f516ad543ab

                              SHA1

                              3d04d3a4377e2e1888cc2be333b129daa8d2894d

                              SHA256

                              c25cbc60ff1ccca811239655636717c9ff4decb9190a557489389504b248d037

                              SHA512

                              46826285f213137cedefe379ece413730a36dcde016e5ac114743cb011e587fde503df1d70ea0e6c4213993749ac4d246e4c3c980b02e01239b392d0f5892e26

                            • C:\Users\Admin\AppData\Local\Temp\nsr77.tmp\MachineKey.dll

                              Filesize

                              52KB

                              MD5

                              819265cb9b45d837914f428373b06318

                              SHA1

                              0725f84eba20acdbd702b688ea61dee84e370b0c

                              SHA256

                              dd2f2d8c0a7d767be40b0f83ac6339ec86068e4ba0f4cd0e3e5b99050dd84fcf

                              SHA512

                              ae4dd3f773568072e86e694c72a08d06b9206cb704a22ced1a922bc04a61a504aee67fc32ffb4d39f9e75f74c533d409756d4d953eaf9ab89cc9fe11f702b30c

                            • C:\Users\Admin\AppData\Local\Temp\nsr77.tmp\Mutex.dll

                              Filesize

                              3KB

                              MD5

                              6899249ce2f6ede73e6fcc40fb31338a

                              SHA1

                              385e408274c8d250ccafed3fe7b329b2f3a0df13

                              SHA256

                              d02a2c0c9917a5ff728400357aa231473cd20da01b538a0e19bc0c0b885ea212

                              SHA512

                              0db15d8050a3d39a14ebe6b58ebd68f0241d3ee688988e1e2217e2c43a834dff0959ba050d7e458ab6dfb466c91a3109ead350fe58fb3daa0753f6ca1ed9d60d

                            • C:\Users\Admin\AppData\Local\Temp\nsr77.tmp\lastpage.ini

                              Filesize

                              214B

                              MD5

                              14f51baaf9e518780594e20887e6fe36

                              SHA1

                              19f934f6a8cb11c53ae06f71457bfa643bb06576

                              SHA256

                              99cc25682aa82e36757361afdd6e0436ff56cdc03993e6d60f20d052f8b9dbe5

                              SHA512

                              d48e9a9e12a69fef2b6c324a9c2f1fb46d8eb931a4cde955f2c196c3ee78ac80dcfdb98cc17530854c3775db41de66b09b9ba498c550ac500ec40cdefe4caf81

                            • C:\Users\Admin\AppData\Local\Temp\pin.vbs

                              Filesize

                              287B

                              MD5

                              3f764ed6ee61afced5405a2e3f62738b

                              SHA1

                              ce56c02f451bdbf20a1003df87fc2692ca06d0ed

                              SHA256

                              22804ed36ad186b3ab18605719c83e70b6244f60aba00e16ca8f97d80b5cc0e4

                              SHA512

                              6ed1d6327b67b3c863f71ede1d8be2f24c51454aab25b104d474024bfafcd732ba84a63ea60b218ce0e97a740c2717f87f4a38fcf211e780d027d36f4bc1d859

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                              Filesize

                              479KB

                              MD5

                              09372174e83dbbf696ee732fd2e875bb

                              SHA1

                              ba360186ba650a769f9303f48b7200fb5eaccee1

                              SHA256

                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                              SHA512

                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                              Filesize

                              13.8MB

                              MD5

                              0a8747a2ac9ac08ae9508f36c6d75692

                              SHA1

                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                              SHA256

                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                              SHA512

                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                            • C:\Users\Admin\AppData\Local\Temp\{51E88177-468C-4B79-9AC9-2CB4A1B97433}.png

                              Filesize

                              57KB

                              MD5

                              589d77eadb85bdf4c192665d565882a9

                              SHA1

                              4805582329ac6b80a045b82c04e1c9328565a13a

                              SHA256

                              4aadc5a6fa4dfbaf3b4c635760fd55476de39ef37d27eacf5c8c6daf99230273

                              SHA512

                              65d881ad2561acde5de4ceea1b1b634ddc44735b3139ab006c957f2543d33c59df6b371e1b5234f504f435595b7ac48330d9afe1fbc85fbed4acb485d1a61bb8

                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\522VE5162IWEXH3TC2FH.temp

                              Filesize

                              7KB

                              MD5

                              74a1cb89829e2b8f531712f5c5fad240

                              SHA1

                              4197bb0783b8881d572fdd434c3282c855e0257a

                              SHA256

                              2828bc482eec9f9c5e00f46c3ed28c57986e34b03a9f26f399f24f92cd6859fe

                              SHA512

                              37b3741e3d14e766ae407ba7985b3fcc7d271b13b3d5dcdd29ea7b1162d8ad8a01a601c7e57456245f50c712cb9571aaafa0c4985accef8d5933e81b71239433

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\AlternateServices.bin

                              Filesize

                              8KB

                              MD5

                              677a2bd2c7b3d5eb8e99d662227811e8

                              SHA1

                              8c1fa316f14bf48b1f3622ee35d6caa08c75ad6a

                              SHA256

                              3b7fb2e6fa6a8c9abc964f6069b0c2f97d1554ecade5fa73bd561b428b1421c7

                              SHA512

                              229b0f7677a3ea2cb7462429c80ea9d3100e263f33919af87df2bd9a5ec62b03af5ed601687699fae60f9668b8e487fd61fac3794fe9507f921b48aec0471ad8

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              5KB

                              MD5

                              638c070faf9c22cae8d06bbef491f62a

                              SHA1

                              5f8e0491c3e88f504c5d81b52fdb77f6164307d6

                              SHA256

                              7764bb0cac8b07b470f924388bd0fcb2e8957e866e6615badac63d051849169d

                              SHA512

                              0918a6ec6aef32f79510e34827539a564223da5425b3c2f5d2a0b63c0a0901e28c6f8d780702593179929cff68a9f6f670307f023f2674bc8cf5332a6c8ac713

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              7KB

                              MD5

                              7497882be8333275ab17e6803ce04788

                              SHA1

                              7c42613140e4ae5909c4d7f6660189f4788aa2d8

                              SHA256

                              9c14bb91b2aac7bdaac2a7454a7a757758d455ea23c5e61d3ac54e972dde4575

                              SHA512

                              ea2dfd628b6334ce1d437aa69c04a32b645410bd9330f697232e1ccd2f74f911cf511f24dc1613ccdab5954ae4f865cb196c6ed7c4618301c54d074a963aa834

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              73bc7da45fb1a269cdb0178c2e2da028

                              SHA1

                              a9b666588af398b9c55da509bab1d22fb361f8b7

                              SHA256

                              e6be5afc1e62e5474012d383c59af1e4dba7ad72d2f198529994d7d989531d6c

                              SHA512

                              14e9ecf7c45646a662e32f4ae67cf7e237b5b197e7e431e804090aa67f7a0b65c9e66e89038e658fce47b96d85e1abc2d91ccd36c7fa8ff8f16c62ec3c989482

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              25KB

                              MD5

                              2f93ebb5b2a045e83ee3d170e7bc6e5a

                              SHA1

                              e09fe71c4ae65a58aa8c8e8c97c5c1a7042a1855

                              SHA256

                              a1445dea60e46a1b6e4f86ebacc29208a61ee6f5091f8cbe8d95048e17065bcc

                              SHA512

                              65b08fbb6f6fba2c046016737f2b950cda90a52fd68ccfff5d192f6ef314c720593e774764d07581a710ce56199a7c1005345bdd7318ed565e896acbb12fc28f

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              6KB

                              MD5

                              b92784a1d77e18fc07829a476f4abb20

                              SHA1

                              9c255fb6493557165c7ad663cda1090f3df5d225

                              SHA256

                              04859fff370609a04802c6e13c6be91737364b195753aa2b4acc53881ac526c5

                              SHA512

                              7a5d363bb4060d8b1719a86b0bbc72d64732699377fba3dd5f0c0671f4acdeda04231f0fa148883e9a1c512932ae1051d63a49f069a3a96ba72832b8408ba0a1

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\db\data.safe.tmp

                              Filesize

                              24KB

                              MD5

                              69828a2d92f021417b87cbd0f661bd62

                              SHA1

                              cf7b86eb1adfbb0bd298cf393a1f8fc9902af0ca

                              SHA256

                              cfe7cf4c4c963bb994e3e9a3725ae6d4b4b8c04355bf16657a8be417964871a2

                              SHA512

                              310acc436310823a815e3111901f61e98c5603853ef401cb1625f57d6f90732fa7674b64d1c3fb2b927940bc5fa2e6dec73fd4139740440169b698d51de9d4a3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\pending_pings\1bb8f84e-4bbc-4a0b-95d4-365ad887bddd

                              Filesize

                              982B

                              MD5

                              085306bff476e98dde185c38a477527d

                              SHA1

                              c3ac67b41d5dcc7d891e6c66c27e86f38d8b1113

                              SHA256

                              c2a3047a28de7d0d706b28d5020de33a6339c0df4cce658ee7aa7f87c1e3b6ff

                              SHA512

                              dd27634ccd6964736f4820f93b862e50ebec4fd52fcc63dd9eb5e4ff28bd11b8d2b3d89696acef3d6fec155b85517f1df96a49a55c8f9eff2ad6babb3e48f91b

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\pending_pings\b56d2e73-6919-4ad6-826b-6b3d4d592420

                              Filesize

                              671B

                              MD5

                              b71edabd0c6b79ac715c4c70af02f27b

                              SHA1

                              d474329e1bc70bbefba89af3ebb0a2ca46b7dcdb

                              SHA256

                              ac6fc81f27158d95a0fca31077ae0d2f3bff308a36180c4505df87ddfc98cdf0

                              SHA512

                              2e5f959be5bb5d787a4d1cd9e1d7590ce2c8a319bd4116ee2619e03d2c148cff4ca495f748c685e22484a45206684f43697881d7337b955afdb491fc62fae057

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\datareporting\glean\pending_pings\c8e2ca57-5680-40e7-a86a-68b84b4f1c62

                              Filesize

                              25KB

                              MD5

                              ed17891c4ec906a4c964b8b56fdc1b56

                              SHA1

                              2258261d866cd0b6d8a53e1620987b1abb2f8112

                              SHA256

                              517e6497487b7a211120df8a8fe3ad71a7c732e612870d0c9962eb8bfddd7c6f

                              SHA512

                              48d0599186c81c04dd18a3315e118584ff2553f94b6923516299136e5f830369c97357951d6de5fa62e357c183c6c155c654220c86f2588c8c4cf0931690d8c6

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                              Filesize

                              1.1MB

                              MD5

                              842039753bf41fa5e11b3a1383061a87

                              SHA1

                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                              SHA256

                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                              SHA512

                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                              Filesize

                              116B

                              MD5

                              2a461e9eb87fd1955cea740a3444ee7a

                              SHA1

                              b10755914c713f5a4677494dbe8a686ed458c3c5

                              SHA256

                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                              SHA512

                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                              Filesize

                              372B

                              MD5

                              bf957ad58b55f64219ab3f793e374316

                              SHA1

                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                              SHA256

                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                              SHA512

                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                              Filesize

                              17.8MB

                              MD5

                              daf7ef3acccab478aaa7d6dc1c60f865

                              SHA1

                              f8246162b97ce4a945feced27b6ea114366ff2ad

                              SHA256

                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                              SHA512

                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\prefs-1.js

                              Filesize

                              12KB

                              MD5

                              648b94001f60557c2877282722cca431

                              SHA1

                              a22de9c1e3ab76b16d839a93ac8fb7ab2684dd9c

                              SHA256

                              98b59d3f557063005982629dbdcb5861cbabb39fdadf8e0f4cab02bfa4d7b2b5

                              SHA512

                              90ffc619c73f0468dc11932285a49b54344fa0d28c210f3d1ebc34df6ac131d79cf504c8fc334e35be9a66e8d90a6501ef18d26fc164890586154f0b0bfd0274

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\prefs-1.js

                              Filesize

                              10KB

                              MD5

                              b329197dfcbf114b0e3ea7e07aa3a102

                              SHA1

                              fbf4323ed86edc420fad4b72b8b6d5be8ac002df

                              SHA256

                              37b6381d3494a08cf29e199585e5b121cd6686f7720592d762de62da170e47a8

                              SHA512

                              16420e3447d513aa974479cd88263adda70750a3d7214d4269724981dc800bee7d67fc8e6ebcfadf2740badf11fd348e654a00a627ce9d08bdd8cec62d8e5259

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              cc3892544946f9f0ba157d9d78eee1fd

                              SHA1

                              b367339339f0a2c05c5270b1b9c0ffa110d27188

                              SHA256

                              f65358015c4818a2fd4ecde238bad7bdb508166f57d329078aab76579d9c0275

                              SHA512

                              3748ac235591cb855b0271b3faf6efdde37c7ce74b3f0e59f1d2109b8d8193a8bc18af7ca1099418ee60dd6ca2d2457061f3b00fb1248f6ced695e15e2ce8f75

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\prefs.js

                              Filesize

                              10KB

                              MD5

                              f1abae1969c6d2a5c443cf27513536f6

                              SHA1

                              c1ff74462625b1cd981bcb89c3bf724de180069e

                              SHA256

                              4941f1e52fd66930fadb8a21acbd7c1415571656adfce3adb7399f400bd07af0

                              SHA512

                              d9d1bd37f73f7c5d9bf27d442f61993c4c5b695e3329dc3519254f9931bcca681240922d44f3954fd6603c1aa5a2c57896a297a232ea3a0fbbe527791b110b84

                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zu7xb6nh.default-release\sessionstore-backups\recovery.baklz4

                              Filesize

                              1KB

                              MD5

                              49c414480f9eb2f3084f098d68669bb2

                              SHA1

                              67375c2ab62281b38d52c44ef476d9284803172d

                              SHA256

                              78cb02b6115d63c6f08973967afbc69e44a2929f4bbcc3193ba6dadc988a09b4

                              SHA512

                              4a604d6f4a9c1432f59a42efabb5585b3309dcc783a333b7b48bf041d89b65503c2254af942c1d988f2fc1640eb28eec6ddd88de7a5d5f5fbaf494fcc71ef847

                            • C:\Users\Admin\Downloads\trash_malware.RhDJDHx-.zip.part

                              Filesize

                              38.0MB

                              MD5

                              1f071d1ad6adbca1695a514d9f953604

                              SHA1

                              0dd305399f173be003927957838f0b7957b80912

                              SHA256

                              5fd84f4f2108568f61eb71479dc359425690f0a589ccf496000aed8f914e5b07

                              SHA512

                              cc0f83bf25a7655f3eb4108f7beb222ea02532d4e9487c3c053c14f35a140f903139c183f9a74e04fac43c3040c64535e598686d2f08ff3b49b791b74e461557

                            • C:\Users\Admin\Downloads\trash_malware\trash malware\AxInterop.WMPLib.dll

                              Filesize

                              52KB

                              MD5

                              c7c4f36c35198df7d2f23c217f4b89bf

                              SHA1

                              9fe2c415e97a8d836cb8b7822d94e8da58014035

                              SHA256

                              022c37312348e74e6b20a1f37ba35aa11b5621567529dc18276a855625aa23ab

                              SHA512

                              aaa72e56b57ce4a7629229ca88bdb095a18aeeeb947fb80a80a6646e01f99444399acdb49580c9c8d8d6a8757595865ae5e9b995597eebe7e70f6a625a8782de

                            • C:\Users\Admin\Downloads\trash_malware\trash malware\Bolbi.vbs

                              Filesize

                              378KB

                              MD5

                              c718a1cbf0e13674714c66694be02421

                              SHA1

                              001d5370d3a7ee48db6caaecb1c213b5dfdf8e65

                              SHA256

                              cde188d6c4d6e64d6abfdea1e113314f9cdf9417bca36eb7201e6b766e5f5a7f

                              SHA512

                              ba0ddff47b618740dfcb63024435c36d895889dd3cf6b4559969283ba8100e8063f5c7767e56dfab67a2b5c96e4ae22e141e5b09e81be5cec9aa7ca7827b4b8a

                            • C:\Users\Admin\Downloads\trash_malware\trash malware\Interop.WMPLib.dll

                              Filesize

                              323KB

                              MD5

                              6515aac6d12e20b052187f256af73b96

                              SHA1

                              e91df2fad020ff5f11c28256650d7e231de67b8b

                              SHA256

                              4a36aecfb0ade38d252327f534058e3dd2e2209629631b9ad2b1c9cac86aed35

                              SHA512

                              ad49c7f734c36eea304846328485b2866d403672511f9df8d4c60038aabbecce952ff5afaf4774eda8dfd7647f0ca1839d136e74dfc16ae43bacd537b453b4b9

                            • C:\Windows\302746537.exe

                              Filesize

                              22KB

                              MD5

                              8703ff2e53c6fd3bc91294ef9204baca

                              SHA1

                              3dbb8f7f5dfe6b235486ab867a2844b1c2143733

                              SHA256

                              3028a2b0e95143a4caa9bcd6ae794958e7469a20c6e673da067958cbf4310035

                              SHA512

                              d5eb8a07457a78f9acd0f81d2f58bbf64b52183318b87c353a590cd2a3ac3a6ec9c1452bd52306c7cf99f19b6a897b16ceb8289a7d008c5ce3b07eda9b871204

                            • C:\Windows\Free Youtube Downloader\Free Youtube Downloader\Free YouTube Downloader.exe

                              Filesize

                              153KB

                              MD5

                              f33a4e991a11baf336a2324f700d874d

                              SHA1

                              9da1891a164f2fc0a88d0de1ba397585b455b0f4

                              SHA256

                              a87524035509ff7aa277788e1a9485618665b7da35044d70c41ec0f118f3dfd7

                              SHA512

                              edf066968f31451e21c7c21d3f54b03fd5827a8526940c1e449aad7f99624577cbc6432deba49bb86e96ac275f5900dcef8d7623855eb3c808e084601ee1df20

                            • C:\Windows\MSCOMCTL.OCX

                              Filesize

                              1.0MB

                              MD5

                              714cf24fc19a20ae0dc701b48ded2cf6

                              SHA1

                              d904d2fa7639c38ffb6e69f1ef779ca1001b8c18

                              SHA256

                              09f126e65d90026c3f659ff41b1287671b8cc1aa16240fc75dae91079a6b9712

                              SHA512

                              d375fd9b509e58c43355263753634368fa711f02a2235f31f7fa420d1ff77504d9a29bb70ae31c87671d50bd75d6b459379a1550907fbe5c37c60da835c60bc1

                            • \??\c:\windows\comctl32.ocx

                              Filesize

                              595KB

                              MD5

                              821511549e2aaf29889c7b812674d59b

                              SHA1

                              3b2fd80f634a3d62277e0508bedca9aae0c5a0d6

                              SHA256

                              f59cdf89f0f522ce3662e09fa847bca9b277b006c415dcc0029b416c347db9c4

                              SHA512

                              8b2e805b916e5fbfcccb0f4189372aea006789b3847b51018075187135e9b5db9098f704c1932623f356db0ee327e1539a9bf3729947e92844a26db46555e8cd

                            • memory/8-639-0x0000000000400000-0x000000000084A000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/448-695-0x0000000000400000-0x00000000004DD000-memory.dmp

                              Filesize

                              884KB

                            • memory/660-714-0x0000000000400000-0x00000000004DD000-memory.dmp

                              Filesize

                              884KB

                            • memory/704-1413-0x00000278D8A20000-0x00000278D8B20000-memory.dmp

                              Filesize

                              1024KB

                            • memory/704-1504-0x00000278FCD00000-0x00000278FCE00000-memory.dmp

                              Filesize

                              1024KB

                            • memory/704-1503-0x00000278FC740000-0x00000278FC760000-memory.dmp

                              Filesize

                              128KB

                            • memory/704-1505-0x00000278FC900000-0x00000278FC920000-memory.dmp

                              Filesize

                              128KB

                            • memory/704-1597-0x0000027090EA0000-0x0000027090FA0000-memory.dmp

                              Filesize

                              1024KB

                            • memory/776-633-0x0000000000400000-0x00000000004DD000-memory.dmp

                              Filesize

                              884KB

                            • memory/920-944-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/920-926-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/920-1371-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/920-1024-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/920-925-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/920-949-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/920-924-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/920-927-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/920-1018-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/920-943-0x0000000000400000-0x0000000000D72000-memory.dmp

                              Filesize

                              9.4MB

                            • memory/1148-606-0x0000000000400000-0x00000000004DD000-memory.dmp

                              Filesize

                              884KB

                            • memory/1480-619-0x0000000000400000-0x000000000084A000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/1624-1697-0x0000000000400000-0x0000000000450000-memory.dmp

                              Filesize

                              320KB

                            • memory/1624-935-0x0000000000400000-0x0000000000450000-memory.dmp

                              Filesize

                              320KB

                            • memory/1624-1378-0x0000000000400000-0x0000000000450000-memory.dmp

                              Filesize

                              320KB

                            • memory/2176-941-0x0000000000400000-0x0000000000410000-memory.dmp

                              Filesize

                              64KB

                            • memory/2176-877-0x0000000000400000-0x0000000000410000-memory.dmp

                              Filesize

                              64KB

                            • memory/2208-653-0x0000000000400000-0x00000000004DD000-memory.dmp

                              Filesize

                              884KB

                            • memory/2312-790-0x0000025D22D80000-0x0000025D22DAE000-memory.dmp

                              Filesize

                              184KB

                            • memory/2476-781-0x0000000005050000-0x00000000050EC000-memory.dmp

                              Filesize

                              624KB

                            • memory/2476-776-0x00000000004D0000-0x00000000006C2000-memory.dmp

                              Filesize

                              1.9MB

                            • memory/2476-788-0x0000000005240000-0x0000000005296000-memory.dmp

                              Filesize

                              344KB

                            • memory/2476-787-0x0000000004F10000-0x0000000004F1A000-memory.dmp

                              Filesize

                              40KB

                            • memory/2720-784-0x0000000000400000-0x000000000043C000-memory.dmp

                              Filesize

                              240KB

                            • memory/2784-745-0x0000000000400000-0x0000000000A06000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/2784-1698-0x0000000000400000-0x0000000000A06000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/2784-951-0x0000000000400000-0x0000000000A06000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/2784-1199-0x0000000000400000-0x0000000000A06000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/2784-1020-0x0000000000400000-0x0000000000A06000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/2784-1373-0x0000000000400000-0x0000000000A06000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/2784-946-0x0000000000400000-0x0000000000A06000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/2784-1379-0x0000000000400000-0x0000000000A06000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/2784-937-0x0000000000400000-0x0000000000A06000-memory.dmp

                              Filesize

                              6.0MB

                            • memory/2960-703-0x0000000000400000-0x000000000084A000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/3048-679-0x0000000000400000-0x000000000084A000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/3332-938-0x0000000000400000-0x000000000040D000-memory.dmp

                              Filesize

                              52KB

                            • memory/3332-947-0x0000000000400000-0x000000000040D000-memory.dmp

                              Filesize

                              52KB

                            • memory/3832-1723-0x00000000004B0000-0x0000000000524000-memory.dmp

                              Filesize

                              464KB

                            • memory/4076-584-0x0000000005E70000-0x0000000006416000-memory.dmp

                              Filesize

                              5.6MB

                            • memory/4076-585-0x00000000057C0000-0x0000000005852000-memory.dmp

                              Filesize

                              584KB

                            • memory/4076-596-0x0000000074F10000-0x00000000756C1000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4076-583-0x0000000000760000-0x0000000000D0C000-memory.dmp

                              Filesize

                              5.7MB

                            • memory/4076-718-0x0000000074F1E000-0x0000000074F1F000-memory.dmp

                              Filesize

                              4KB

                            • memory/4076-719-0x0000000074F10000-0x00000000756C1000-memory.dmp

                              Filesize

                              7.7MB

                            • memory/4076-582-0x0000000074F1E000-0x0000000074F1F000-memory.dmp

                              Filesize

                              4KB

                            • memory/4284-673-0x0000000000400000-0x00000000004DD000-memory.dmp

                              Filesize

                              884KB

                            • memory/4408-659-0x0000000000400000-0x000000000084A000-memory.dmp

                              Filesize

                              4.3MB

                            • memory/5004-942-0x0000000000400000-0x000000000041D000-memory.dmp

                              Filesize

                              116KB