Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20250207-en
  • resource tags

    arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2025, 23:42

General

  • Target

    2025-03-09_71b6edbc1e19ffcf2a3a812df77de76b_icedid.exe

  • Size

    40.4MB

  • MD5

    71b6edbc1e19ffcf2a3a812df77de76b

  • SHA1

    ecea742180e89d01ff7b526d54e8b8d8eed209de

  • SHA256

    1f6d1c0b88fd870a2b002d30ebf09341aca377d7de7f756f6c1c0bd818fa0d71

  • SHA512

    dd2622b37d92e8a77802af5251d0d258c9d2276bdbeb8eee2680253b5b48bf16c862141c269c81e1683206a624ec09ba60edecb6c088dcfae740805f2aab3af0

  • SSDEEP

    786432:Pc9GTpB4exkcTadgg8hdmMb9J/8YX72fhB4Sf2m25yguq4av:Pc9ABN7yy9iG7cPva3

Malware Config

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Vjw0rm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 8 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2025-03-09_71b6edbc1e19ffcf2a3a812df77de76b_icedid.exe
    "C:\Users\Admin\AppData\Local\Temp\2025-03-09_71b6edbc1e19ffcf2a3a812df77de76b_icedid.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe
      "C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe" "SFXSOURCE:C:\Users\Admin\AppData\Local\Temp\2025-03-09_71b6edbc1e19ffcf2a3a812df77de76b_icedid.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\Cruelty.js"
        3⤵
        • Drops startup file
        • System Location Discovery: System Language Discovery
        PID:2648
      • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\Movavi.Screen.Recorder.9.1.0.exe
        C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\Movavi.Screen.Recorder.9.1.0.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Users\Admin\AppData\Local\Temp\is-JLI1N.tmp\Movavi.Screen.Recorder.9.1.0.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-JLI1N.tmp\Movavi.Screen.Recorder.9.1.0.tmp" /SL5="$901C6,37729234,419840,C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\Movavi.Screen.Recorder.9.1.0.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Program Files (x86)\Movavi Screen Recorder 9\ScreenRecorder.exe
            "C:\Program Files (x86)\Movavi Screen Recorder 9\ScreenRecorder.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Checks BIOS information in registry
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Loads dropped DLL
            • Checks whether UAC is enabled
            • Writes to the Master Boot Record (MBR)
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Modifies system certificate store
            • Suspicious behavior: AddClipboardFormatListener
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1384
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic path win32_VideoController get description
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              PID:2480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Movavi Screen Recorder 9\Qt5Core.dll

    Filesize

    4.4MB

    MD5

    801443aa2aa460efb78dc05f597825b0

    SHA1

    9ba0566c1e27e1ef5d369d5ed40b665be4fe5710

    SHA256

    5a8bfc8e12ce5230cf9b53113bc3d00fbf1ab028237946f220652d547c344bdc

    SHA512

    44d8d3ed9e7bea1cb6e62ecd92176721e00770fb0db2df2ce62d636589d96c216837bc0b6bcf39f2b9415638c1fa051115e8f92206d5bb7fd30cae37f436a92b

  • C:\Program Files (x86)\Movavi Screen Recorder 9\Qt5Gui.dll

    Filesize

    4.8MB

    MD5

    858d2da4f64e2ddde88c4b62e977872f

    SHA1

    27d785c79d38db3d04621759a4741ed7d143f471

    SHA256

    405ca324a2ad604fb2440e36a47e3d0d89beaf7ca2e50a835f1bb8fcd1955e8a

    SHA512

    e200db03ec3acf6e3ef99579db9eebc359c842456cf4eaa2d0a8d25d4a133e554f3ace2655a6443d79c535dec2c782f0b8d79afe02ea9a6c8558b8e284899070

  • C:\Program Files (x86)\Movavi Screen Recorder 9\Qt5Widgets.dll

    Filesize

    4.2MB

    MD5

    6b832073595873bbe5d3b70f0adcfdc5

    SHA1

    7752779515da260cb030c57abd9baa9928df2cf2

    SHA256

    6aca876fe23e88220a08c31385603327f578931e32b37b256c292207729ffbd3

    SHA512

    0fb20cc6aacfd4df6d1fae853b51052104ed7bcda4b7faab6d1b48fcc22c2cf661fbfbf5a70f4ec9720f52f2469f47941afbf05d9dc44ca61f3a580a6958e4f2

  • C:\Program Files (x86)\Movavi Screen Recorder 9\resources\locales\nl_NL\LC_MESSAGES\is-3EPNQ.tmp

    Filesize

    34KB

    MD5

    e6c8801294468a23bf3e749394f9ba96

    SHA1

    92b618efbcdb9e72626e5899235cf119501084e9

    SHA256

    1393e37abc610b05a3727f1ad1bd0ada7f6e35a8a2ff6a19261a25f988649a99

    SHA512

    60ae12f138886a8d6f37967b01706192d08dee5a0fa8553319cdf1d521b562e6641928df37da0fe102b106bcc6d484b4f3b22f0f092602ca91ab96a676784c3f

  • C:\Program Files (x86)\Movavi Screen Recorder 9\resources\locales\nl_NL\LC_MESSAGES\is-MQKCQ.tmp

    Filesize

    64KB

    MD5

    60034cca8f190e4c5a76b5ce7918a97c

    SHA1

    5e94ed099ad896d388cdd30ce5d5a7f4a767fa6c

    SHA256

    27d2b5e9bee5a18143b90f209ef835c622d7fc31dc562383c7a560f01fca2456

    SHA512

    f6b15656f2a2cb39ef95b9fec56ebdcf3e7fee28a311d397984663991881bea1e8b3ed3ef7ed1b9665ef67271efb8b1d4b8d9d69892e800d39413fc8067b6e01

  • C:\Program Files (x86)\Movavi Screen Recorder 9\resources\locales\zh_TW\LC_MESSAGES\is-KEIV5.tmp

    Filesize

    64KB

    MD5

    c772b33fd8f41d26a0bf0734fec8503b

    SHA1

    8d25e72d9c8538dd6c21b19a404c63d400f8bab5

    SHA256

    c3132eb1e2960f39de6e2a05def429303ec3e3401dc73a514807f8b33ed67fdf

    SHA512

    f3120f289a3a617b9f5ff750b856ea47dfb0cb299d40a4cabee6124ffa7c085b72a896892dd0d29a7a632f24eb9bd34c07beea09badb10151c1c0a9e065d0e08

  • C:\Program Files (x86)\Movavi Screen Recorder 9\scapp.dll

    Filesize

    517KB

    MD5

    9c1564215bd5f226b54f0593fec587de

    SHA1

    6d353ab0dbb914e8e693336018de2fe5419c97f4

    SHA256

    c5f1c22d265fdc9125c4626b383488d2f810b60ec43cb90477e936a151238433

    SHA512

    f6a8a86dc554298d7cb9576e00ee4ba98be98151479c93abcc8bc5b038c9be8d90c70056f5012811bd5653442e5fc89a0d4e30a4b5ac0ac1475cade03061c213

  • C:\Program Files (x86)\Movavi Screen Recorder 9\ucrtbase.DLL

    Filesize

    899KB

    MD5

    bff9ff54d28a3023a6eedf99de29a80e

    SHA1

    1c1ddf708814886770667a9e4e792a08f5f6fb26

    SHA256

    cac19a17a6c508cf5956c189833d19eb42f56498b71ab48f0e831d41e5e1b55c

    SHA512

    198bfc1d2b520acc2960717e790b25a788e463277ab1b423c44f7e131d8b8889e44f5f041eb196f17007e853a8cca78c2390e7aae79147ab81d1c26e31b66c20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\Local\Temp\Cab7274.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar74DB.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\Cruelty.js

    Filesize

    71KB

    MD5

    0e485f13fb89e6bb4e0c758d59178a3d

    SHA1

    20ed42d774040648fe9ed7ee2c9508f1d136dc4d

    SHA256

    862a21d8ce951d5b8b4e1b3d1d53d40928ce599c916861c3c850f7797c4c7211

    SHA512

    60622ef645267d17daf0d223de191141e56c165c36f14e8fb691231171d7b626933ed72c4c4da636b0f0a9593c63e0f5967789ea9006c91cfebc06484e527c00

  • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\Docs\Movavi.Screen.Recorder.9.1.0.exe

    Filesize

    36.4MB

    MD5

    b6258f5a3b3a32bde1d3e30e76510914

    SHA1

    69bcf9243ef05eb8600f1d66f5d041e08d6f5d29

    SHA256

    314839e4bd63bbe51b07d04f73d7bcf8e8bc76927fce95f8d201f92d1f5182be

    SHA512

    f4bf8cc4f1c45daa257356143937e2a523e7e5424b0c9219c6ef963cac11d3310bf768841bb2ade7c9a343f6e49bcb61653b02952afe87ae52965577c9771db5

  • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\AutoPlay\autorun.cdd

    Filesize

    12KB

    MD5

    b63e5932ae4cfca71b60da45fbdd17a2

    SHA1

    f2a097d2e5493ef22a3d293dc28d57d2d4d0af5a

    SHA256

    8b2eff18e5984c212e2f50f1b861909a576118031a50ca35b18314805191e6a6

    SHA512

    093942009491538055219f901e46f4b18e1df901d59b122303efd683728f87c674e7a2b1d428fa366ee05fadae0e9529a615262808e2d3ae8ae3eb96ced012f5

  • C:\Users\Admin\AppData\Local\Temp\ir_ext_temp_0\Icon_1.ico

    Filesize

    361KB

    MD5

    fe8d83cf53a6babfa5ddd45ecea60023

    SHA1

    70436c3b8377b937b5edfc8b0e51d42553c3cd07

    SHA256

    47e11c4b314546b143cd5454fa1e976c198832749c1f3537320842b558f3110f

    SHA512

    3a9177d94234c03ef846ee53f199cfd7e60a84851fc96a0f5d0ecf1c85eed2998577872bebcb9632d5f3d6553213d1762b4c8de3cbddb1e9dc3f73a14321051c

  • C:\Users\Admin\AppData\Local\Temp\is-JLI1N.tmp\Movavi.Screen.Recorder.9.1.0.tmp

    Filesize

    1.2MB

    MD5

    b105eb9d17fef15cb329c42680565088

    SHA1

    92dfd49914a89d4756185ed001f526c872cde7c2

    SHA256

    8079c19622b01bf225258efb551a50b45f454b9b8811f8936e0a42bf79679c40

    SHA512

    d6662d6ac6e0f71faed9946420751dcbcfa29f10c9d15596eaf2627dfc6b24174fe6aafb8a72b7613b2558f5ed1590a5e6d7e509bd95e1f93af7df9b29ebac3e

  • \Program Files (x86)\Movavi Screen Recorder 9\ScreenRecorder.exe

    Filesize

    4.3MB

    MD5

    f4fdd607aa5b9735fcf239634514a8c9

    SHA1

    3046a7ca70ef5ba152f438891f45e28c1fe39492

    SHA256

    56afd559a8b714ac412a340647a0a28c8d21b3c96b3847b5a1da95af4e4fd661

    SHA512

    6da3356729961e0d16d49a168f9238c5c039fb8d590cb6a9cc31ef603f3b2fd0a4077deb0d844717413cc297c6c525708c97ff906ea9904ef7279fea2b17266d

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-core-file-l1-2-0.dll

    Filesize

    18KB

    MD5

    efa0bba55ec4de4057b7b42e90c21fdd

    SHA1

    2f795aaf0fc2abc379d20d37d9f0f59acbc5a4d5

    SHA256

    5c1b03755bba813b3a003e817fcc55926382b6987432b2b59c03d2a384813016

    SHA512

    cce14bc3eb3a7fbf129bdf65b44e296b91bb54d492d7d415b1cce4587bae6700b198837d3bda8536432af6bcaf61c6ea225c3e2d7e8d3bbca7c7f293f1ed2344

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-core-file-l2-1-0.dll

    Filesize

    18KB

    MD5

    dd9db5bf928376a33e240bf95a5146de

    SHA1

    4a0365f6977bb11c2ab3d6279851ba9a51a3943b

    SHA256

    e2d92b763360e67fe86405406efe91cb50abd63c90a2248a471c7c282d302b4d

    SHA512

    a19885d2b55ff36a815e2fe11ff7428728ad6cca1a56038102ebe07589c7ed3b2cce4c29110c0ec73e34b1db122d2fa23bc1ef0495d7e09d9084771e4c284d6e

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-core-localization-l1-2-0.dll

    Filesize

    20KB

    MD5

    74d98be08d4a7b340ffc853b77925718

    SHA1

    49347194f9dfdeb7cfcd2edbec617aec1f8e8702

    SHA256

    ae26c0715060a2e5518871eb693c11c5ebffa3ae25badbe82c3562df8e6587bb

    SHA512

    b88ba75e8f40fc3565715f1ddaade1823b10adf06c61bcfce4054cb2f719e679d54fe5d289b479e53b177dc9a7eac279bef3e39447f5e4f19811abb42ea02978

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-core-processthreads-l1-1-1.dll

    Filesize

    18KB

    MD5

    f828f2a3ac49edac87946559db2384b4

    SHA1

    19761b597abdee64d82e592e93f50d0a49e5a6de

    SHA256

    ec712bdbbae51875bd277cdfc45ccc8ba25a6020a96ab2731edf4070e9fa1323

    SHA512

    d8efc7cdd15a83715ff3d0e9c4b83c0aa281fbd565e3ab447104dfe576d61fda9629582d58d80cd55818f8bbc6a40414a4c51383dd75e049061087e053c8b63e

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-core-synch-l1-2-0.dll

    Filesize

    18KB

    MD5

    79c6c9048acc2052959812da2c20eec3

    SHA1

    265569b823cf8473c6833dbaa4091b4361a2ee49

    SHA256

    f9a388aa8221d477a51c19a292e5bfee1f1dfce46d5fa87e9ea0c6ea3e6be0cd

    SHA512

    4e6d7a4a2542e4b2cedb105e1f058b9e242817f36c339427504fc5dd99c5e5e9710fbb263aef8e491f0e6dde9e2b7e8762d4c498853c278be168d857b8bc2a58

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-core-timezone-l1-1-0.dll

    Filesize

    18KB

    MD5

    33bd41c9fd1b8e26f8720b53b9ca501d

    SHA1

    201488e7db1cf2c8cca4b7e02f26f1f269d67b1a

    SHA256

    6fc8834a47120855ff4c4b22c65f95c882f2d14521bfe7364e364e23f90c1401

    SHA512

    3d8231894a66720462e553e7da346b784006ef420da6e6fb4134738bf20ea66d0f766e259eac5f2ae7fe0b071b6830da071e72bf2f098c7e755d49c99c3b0b98

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-crt-convert-l1-1-0.dll

    Filesize

    22KB

    MD5

    6d419083dd1b8452553eb410ea041aec

    SHA1

    d2cfb680cb206fdef8a10d87b9905810a77186de

    SHA256

    e0e52ff33378fc2a1dc2b9d6862d7e4092134691ad06e600049bdf5d93b25a07

    SHA512

    626d1b8b47cc70c339a15501df13d70199cf008991aedc80fda68ec206939f3cd835d4532215a06c13584f108ba4d2fe5197215cab6d39be2e04002533e9b888

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-crt-heap-l1-1-0.dll

    Filesize

    19KB

    MD5

    1174f628380f76bd2e5eb994311ae44e

    SHA1

    c06a29ae801c7a6af826f8b31d76a69e6f7a6ce5

    SHA256

    a2232ae8144057da28983ce7d47181aaea37c21d0f2932b259fcc068e89c365a

    SHA512

    f90d3e87bcbceb8845dd2ddbdeae262ffdcd937c95da8884575c1a6b8493b29bdbae56999782050ffe38ed156051ed9739f87d2dc30ec93cfa5b1e217ea48cff

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-crt-locale-l1-1-0.dll

    Filesize

    18KB

    MD5

    09b011350b65faecbe45ce5cee01e2db

    SHA1

    776e986f1d5792773e19b55222d52bf7604bf9eb

    SHA256

    7d4778631d45245eec2313b86e437e8884652896062f841790aaafe1ea0e38d4

    SHA512

    8d0104cfd06e2c6a3cc1305ecd297de1887f3e1ab2556da93c717191a5fbfb3d1f09e09258ef2439ce0dcab93144b2b1a9ad6995be6e3493f92c9fe4d34438d6

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-crt-math-l1-1-0.dll

    Filesize

    28KB

    MD5

    12a705fe511be63c516a05a86c3ad8aa

    SHA1

    8d4f1d45baf6f0d6c7d06443daba31d0f425d231

    SHA256

    aabd2854ef538165756cc8abf30fb0cbda78d750a947ec4c41fcb218fafc91dc

    SHA512

    74b0f07e8e83ef88dc5b1bed11b9675daefb61be238610ef0f41b8f162df8806e42d94380241f23fb3ddcf83aa0070c50c0b40a9e6e538ea0d9cf57fcd27e794

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-crt-runtime-l1-1-0.dll

    Filesize

    22KB

    MD5

    ec0aa3c4ff18459bfb1b82de937d23d9

    SHA1

    04052f7d70ac1d768e937d2fe6a28e0d3bedc4a4

    SHA256

    4ed288d500b857ea3d54c5de6667b118cd9c0f357d7c24456657d42c01ca5ab7

    SHA512

    2ebc2688ec8a9cf138af5a1f621a92569838e7fa2746ece3b36d3655c10842145bd8452898d81ccccb8a925a5e9705cee2b134682b39a29c6ba8232ef2a8ce3a

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-crt-stdio-l1-1-0.dll

    Filesize

    24KB

    MD5

    db0eb179c661b8344a54657d74a65b2c

    SHA1

    11b0d8e882c0b0ebc00555420035741c67ae4bf8

    SHA256

    eac8835d36d17a836506f79085ad10765f3e2c65e093b4bc3211c8451fb46982

    SHA512

    c120f9ed87e3936580fef4019d2f908e67ded91a2ec8ea53874483a5b80aaee632598ab85a7d4efc65a7f53a4fb995c05b62f6a0db9f9225c97408887257eb3c

  • \Program Files (x86)\Movavi Screen Recorder 9\api-ms-win-crt-string-l1-1-0.dll

    Filesize

    24KB

    MD5

    1144cb3d8fef162bb166964ec1fdf053

    SHA1

    b273400af2239fec7df9478ef09b10341b2f019d

    SHA256

    998b12349839f19f696982e7d9b92a5ea7af4003713c68e83203626ff28d88f3

    SHA512

    039d406d7e44831129fa1dcf50f92f29ff26837f26f3e177a891d17df681567778d781794399d67997e4eb798d9deddb25a6e11580d33d6b327600fa4accb5b2

  • \Program Files (x86)\Movavi Screen Recorder 9\msvcp140.dll

    Filesize

    429KB

    MD5

    d25c3ff7a4cbbffc7c9fff4f659051ce

    SHA1

    02fe8d84d7f74c2721ff47d72a6916028c8f2e8a

    SHA256

    9c1dc36d319382e1501cdeaae36bad5b820ea84393ef6149e377d2fb2fc361a5

    SHA512

    945fe55b43326c95f1eee643d46a53b69a463a88bd149f90e9e193d71b84f4875455d37fd4f06c1307bb2cdbe99c1f6e18cb33c0b8679cd11fea820d7e728065

  • \Program Files (x86)\Movavi Screen Recorder 9\vcruntime140.dll

    Filesize

    81KB

    MD5

    a2523ea6950e248cbdf18c9ea1a844f6

    SHA1

    549c8c2a96605f90d79a872be73efb5d40965444

    SHA256

    6823b98c3e922490a2f97f54862d32193900077e49f0360522b19e06e6da24b4

    SHA512

    2141c041b6bdbee9ec10088b9d47df02bf72143eb3619e8652296d617efd77697f4dc8727d11998695768843b4e94a47b1aed2c6fb9f097ffc8a42ca7aaaf66a

  • \Users\Admin\AppData\Local\Temp\ir_ext_temp_0\autorun.exe

    Filesize

    6.9MB

    MD5

    2648e3f8738bab0147d58032d098201d

    SHA1

    f3092d1a7cbb3ad78c04fb1d1509b848e569c92a

    SHA256

    8fc328cd4392054e12868d9db685e73b7c4b4f53e43fadb23de4f14428687c91

    SHA512

    9b178545754d87f7b7c439b0985b80478ce1765433b508098af10e82806756fc01b57a98e1256e3c3110b0ed9bfae4101b8d4566fe95836c4d2ab77073758e96

  • \Users\Admin\AppData\Local\Temp\ir_ext_temp_0\lua5.1.dll

    Filesize

    326KB

    MD5

    05ceb6d2e88a896d6ada0ab3f0dc40aa

    SHA1

    2b62cc437f5b3268acb3f569b43fd6c0a08e4e47

    SHA256

    b574d89422afcaae5446d8fd88d3b7cb48d608cf5411db761916b35c9999b41a

    SHA512

    fd9a03167c70ddd156d6942e503f7d9528e4748e9613cfba69181eb8b50fcaea9f6d3b9e1398da21d4e4c8bf47c99fe2becc88b98107a4fdcb80697510c1860f

  • \Users\Admin\AppData\Local\Temp\is-0864T.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-0864T.tmp\b2p.dll

    Filesize

    22KB

    MD5

    ab35386487b343e3e82dbd2671ff9dab

    SHA1

    03591d07aea3309b631a7d3a6e20a92653e199b8

    SHA256

    c3729545522fcff70db61046c0efd962df047d40e3b5ccd2272866540fc872b2

    SHA512

    b67d7384c769b2b1fdd3363fc3b47d300c2ea4d37334acfd774cf29169c0a504ba813dc3ecbda5b71a3f924110a77a363906b16a87b4b1432748557567d1cf09

  • \Users\Admin\AppData\Local\Temp\is-0864T.tmp\botva2.dll

    Filesize

    37KB

    MD5

    67965a5957a61867d661f05ae1f4773e

    SHA1

    f14c0a4f154dc685bb7c65b2d804a02a0fb2360d

    SHA256

    450b9b0ba25bf068afbc2b23d252585a19e282939bf38326384ea9112dfd0105

    SHA512

    c6942818b9026dc5db2d62999d32cf99fe7289f79a28b8345af17acf9d13b2229a5e917a48ff1f6d59715bdbcb00c1625e0302abcfe10ca7e0475762e0a3f41b

  • \Users\Admin\AppData\Local\Temp\is-0864T.tmp\iswin7logo.dll

    Filesize

    39KB

    MD5

    1ea948aad25ddd347d9b80bef6df9779

    SHA1

    0be971e67a6c3b1297e572d97c14f74b05dafed3

    SHA256

    30eb67bdd71d3a359819a72990029269672d52f597a2d1084d838caae91a6488

    SHA512

    f2cc5dce9754622f5a40c1ca20b4f00ac01197b8401fd4bd888bfdd296a43ca91a3ca261d0e9e01ee51591666d2852e34cee80badadcb77511b8a7ae72630545

  • memory/1384-1139-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1194-0x0000000001170000-0x000000000117A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1090-0x0000000001290000-0x00000000021D0000-memory.dmp

    Filesize

    15.2MB

  • memory/1384-1281-0x0000000001170000-0x000000000117A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1280-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1279-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1274-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1275-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1276-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1278-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1277-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1272-0x0000000001290000-0x00000000021D0000-memory.dmp

    Filesize

    15.2MB

  • memory/1384-1273-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1137-0x0000000005C50000-0x0000000005D8C000-memory.dmp

    Filesize

    1.2MB

  • memory/1384-1140-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1195-0x0000000001170000-0x000000000117A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1143-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1142-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1141-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1144-0x0000000001290000-0x00000000021D0000-memory.dmp

    Filesize

    15.2MB

  • memory/1384-1145-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1146-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1149-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1148-0x0000000005870000-0x000000000587A000-memory.dmp

    Filesize

    40KB

  • memory/1384-1159-0x00000000063D0000-0x00000000063E6000-memory.dmp

    Filesize

    88KB

  • memory/1384-1150-0x00000000060C0000-0x0000000006146000-memory.dmp

    Filesize

    536KB

  • memory/1384-1152-0x0000000006300000-0x0000000006362000-memory.dmp

    Filesize

    392KB

  • memory/1384-1154-0x0000000008C70000-0x0000000009CD2000-memory.dmp

    Filesize

    16.4MB

  • memory/1384-1155-0x0000000006540000-0x000000000657A000-memory.dmp

    Filesize

    232KB

  • memory/1384-1158-0x0000000006910000-0x000000000694D000-memory.dmp

    Filesize

    244KB

  • memory/1384-1156-0x00000000065C0000-0x00000000065F8000-memory.dmp

    Filesize

    224KB

  • memory/2660-1064-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/2660-1086-0x0000000000400000-0x000000000054D000-memory.dmp

    Filesize

    1.3MB

  • memory/2660-91-0x0000000073F90000-0x0000000073FA1000-memory.dmp

    Filesize

    68KB

  • memory/2660-82-0x00000000003C0000-0x00000000003CF000-memory.dmp

    Filesize

    60KB

  • memory/2660-94-0x0000000000400000-0x000000000054D000-memory.dmp

    Filesize

    1.3MB

  • memory/2660-90-0x00000000743B0000-0x00000000743CB000-memory.dmp

    Filesize

    108KB

  • memory/2660-80-0x0000000073F90000-0x0000000073FA1000-memory.dmp

    Filesize

    68KB

  • memory/2660-92-0x00000000003C0000-0x00000000003CF000-memory.dmp

    Filesize

    60KB

  • memory/2660-1147-0x0000000008140000-0x0000000009080000-memory.dmp

    Filesize

    15.2MB

  • memory/2660-1058-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/2660-89-0x0000000000400000-0x000000000054D000-memory.dmp

    Filesize

    1.3MB

  • memory/2660-63-0x00000000743B0000-0x00000000743CB000-memory.dmp

    Filesize

    108KB

  • memory/2660-1089-0x0000000008140000-0x0000000009080000-memory.dmp

    Filesize

    15.2MB

  • memory/2724-1087-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2724-44-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB

  • memory/2724-88-0x0000000000400000-0x000000000046D000-memory.dmp

    Filesize

    436KB