Analysis

  • max time kernel
    96s
  • max time network
    98s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-10-2024 06:27

General

  • Target

    https://drive.google.com/file/d/151dPMCC2u8sJy6l586-siDmTQpOypwUF/view

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/151dPMCC2u8sJy6l586-siDmTQpOypwUF/view
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdf7a63cb8,0x7ffdf7a63cc8,0x7ffdf7a63cd8
      2⤵
        PID:540
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1928 /prefetch:2
        2⤵
          PID:348
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1404 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3496
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:8
          2⤵
            PID:3672
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
            2⤵
              PID:3384
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:1
              2⤵
                PID:3396
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1
                2⤵
                  PID:3840
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5816 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2500
                • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4020
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:1
                  2⤵
                    PID:4268
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4680 /prefetch:8
                    2⤵
                    • NTFS ADS
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3968
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1
                    2⤵
                      PID:1416
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:1
                      2⤵
                        PID:2724
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6416 /prefetch:1
                        2⤵
                          PID:388
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:1
                          2⤵
                            PID:1976
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:1
                            2⤵
                              PID:2312
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:1
                              2⤵
                                PID:3724
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2968 /prefetch:1
                                2⤵
                                  PID:3432
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1900,4969524200019414585,5128630609508745317,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:1
                                  2⤵
                                    PID:3416
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3760
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:2064
                                    • C:\Windows\system32\OpenWith.exe
                                      C:\Windows\system32\OpenWith.exe -Embedding
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1320
                                    • C:\Windows\system32\OpenWith.exe
                                      C:\Windows\system32\OpenWith.exe -Embedding
                                      1⤵
                                      • Modifies registry class
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4804
                                      • C:\Program Files\7-Zip\7zFM.exe
                                        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\yaf extractor.7z"
                                        2⤵
                                        • Subvert Trust Controls: Mark-of-the-Web Bypass
                                        • NTFS ADS
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: GetForegroundWindowSpam
                                        • Suspicious use of AdjustPrivilegeToken
                                        • Suspicious use of FindShellTrayWindow
                                        PID:1896
                                        • C:\Users\Admin\AppData\Local\Temp\7zO8674A978\yaf_extractor.exe
                                          "C:\Users\Admin\AppData\Local\Temp\7zO8674A978\yaf_extractor.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          PID:3568
                                        • C:\Users\Admin\Downloads\yaf\yaf_extractor.exe
                                          "C:\Users\Admin\Downloads\yaf\yaf_extractor.exe"
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:4224

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      4c1a24fa898d2a98b540b20272c8e47b

                                      SHA1

                                      3218bff9ce95b52842fa1b8bd00be073177141ef

                                      SHA256

                                      bbcc378fcbf64580e7a48b4e7ca9be57fa0a1f2e747f488325685bdb18d73a95

                                      SHA512

                                      e61f196e7f1c9a5fe249abe9b11eea770fb2f4babc61f60b12c71f43e6fe9354cf14869daf46abc2c2655bce180252acd43c10562a2dcd31fa7d90d33253820e

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      f1d2c7fd2ca29bb77a5da2d1847fbb92

                                      SHA1

                                      840de2cf36c22ba10ac96f90890b6a12a56526c6

                                      SHA256

                                      58d0f80310f4a84f687c5ce0adaa982eb42fe4480510399fa2ae975d40bb8bc5

                                      SHA512

                                      ede1fafea2404f16948fe0b5ea5161ccee3ee6e40c55ff98c337eac981a6776b9c73dc030a5c59e4347aec91259f497539206e71949c33adcecbf2c846709e14

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      408B

                                      MD5

                                      3f38056a95fbbf9db94c5915f39ee7aa

                                      SHA1

                                      ce9557ac846963f2e1d9d139962c4d7a6b7f3cd8

                                      SHA256

                                      c384a1f58c83a9f79fe4a1c769543e83e5d2fb46fc2d921ffec3b1a1056f105b

                                      SHA512

                                      af43682ffb5174e1ad10957eb662bd2bd174582ad5ce6796195d39a7af19d7dc5d8c5a4160578bb1310681ab825722519b435f9c50c925d4843fb96a54c5c308

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      3KB

                                      MD5

                                      225537203f9a03e794a5b24bed6f8641

                                      SHA1

                                      2063fb51fa8bf5ba4c90f2373619c149247c8bd5

                                      SHA256

                                      383a9da1b64818afe324ee5952e5b0c73daed6f10f4f406e0e274c697abd1312

                                      SHA512

                                      aeffb62c8068849b5e16d0c573e09df03cb3ade9089cd052ca4f44b30d65a517b9ac1243870fe1d16f887df4d9190d0f28a1da81ad3114a1e9b2b1bd9ba67a12

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      63d49e14c5c6466efe5a99e8bce9fe6f

                                      SHA1

                                      4ef912930e06cb38313af01d19006b1c38031276

                                      SHA256

                                      f840164a7eb12fd7a753e2f651097e9bd628ce74bc301fd466485e60602f6e29

                                      SHA512

                                      84d3147ac78da6db7d61f0cad2827b3f325d0623d553e7d31725df39fb08c43c7ab93df5eac1ea4b127a2b6739a15698b79b4b81f3e4025d14572b0d4a08d931

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      d926066fdd82f70a3b5f4ed24a6e896a

                                      SHA1

                                      a7e3f87b7393656d6133d300b54c65d7b45181ed

                                      SHA256

                                      79893c691a0fafd918b98e40956ee5b9369aa81394178aea4fade1da2886e4be

                                      SHA512

                                      cb8ce5d334e411fc5aa2197c0ce5ec772c78d9cd7c1673b183c443160a32a62b12d9ca2673895841619cf88daf6b14de645a6754bd929dd171eaebdd27d7d3ab

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      48947af6dcbd9db26479a2cfa85dbd6e

                                      SHA1

                                      9b1bf120c57b3070db67740b5049cab8b41d6426

                                      SHA256

                                      09542ef51455bbde742f25da12ded673bc448deb83868996c3b5763810af52e5

                                      SHA512

                                      3f25dc7e8f05580084e767fa625f3170496b3b659102db2b701bc0feb16de04bfe832c7904eb390b0df2460025584a1eff29e836cc43e2b55de8e92cac41c76d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      206702161f94c5cd39fadd03f4014d98

                                      SHA1

                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                      SHA256

                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                      SHA512

                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      af0b7d8bf3946ead2cb99360ba5268a2

                                      SHA1

                                      b8748a68ecef8bae5a93379d482bd60163240f36

                                      SHA256

                                      110895c7a12929aa00f4e857ebd480f6ec202d2633645779a34e7c36f44b6f6d

                                      SHA512

                                      595f43a33a226533c9d7f3781b8e86a297d902231657470f62e552d087a7162fc23a7f0f5bab048d28af1d18abd0343b3f811ad235536913051c837d2ff1aafe

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      bc4b115018aeaf1638f411d86e0507b3

                                      SHA1

                                      2eda4f088a36e3a86122e0af7e13d507f6be422d

                                      SHA256

                                      d5bbccfeb12d92e36a11661ea6881668987981b7c536ac5e187f42bc57d87ef5

                                      SHA512

                                      93d0dd9f58fd655d77b3f69ab3518320a7a634d04ed21d49ddbce897c740e089136004c67de59710e459c35d4fda9ae2c07cbe0cf90b3ff74eb133b33f84a45b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      c45bb4ab396d4c59b121ea37f05a73cc

                                      SHA1

                                      7e24ab052fedd2acdbd3df0c6c2663a8d234c18d

                                      SHA256

                                      d9f0216086c03f1c9b0b62842929e3098c4ec618927b25aa078e1121b75b9904

                                      SHA512

                                      af7d63e75bc2409f530b932bfe69b667cd827ed2888f4476faddb2ed2f1ab97134577d3d6f7e49fafd2b7794ee99e35e1385770931378a91704ac4f9951b734e

                                    • C:\Users\Admin\AppData\Local\Temp\7zO8674A978\yaf_extractor.exe

                                      Filesize

                                      8.5MB

                                      MD5

                                      d685a1905f22eaaac99f50cd5b3e5a1f

                                      SHA1

                                      92080376a287838e617e1ba1d2969b6836537822

                                      SHA256

                                      bdb51773ba304e10d06545e556e66299ff84cc9488b61be7c4ce153e7136592f

                                      SHA512

                                      c4975dceea31bb223e38ca14c4600e2d40af42ff0a310139a4143101f41c4df1e619424b06309f9badff43722b746da11fc063cfba658d3b0f7cc1f77f83d209

                                    • C:\Users\Admin\AppData\Local\Temp\7zO8674A978\yaf_extractor.exe:Zone.Identifier

                                      Filesize

                                      173B

                                      MD5

                                      90c6775a4e0eeb639e52214df0d19a2a

                                      SHA1

                                      cac3f8e588f184fe335a5b72de36336e8d1e2c04

                                      SHA256

                                      2ff13bed4f3581f3fee12d31a7a4dc4ff80495d41ec2b7924e7e7482c860218a

                                      SHA512

                                      6842daf613d8b48318b33d50b5475f29143966b688d203da169ab474576d0008703769e5ea3dfcbc40eb05507a09b16fd87ad277250cce418e9f7e00ad58c980

                                    • C:\Users\Admin\Downloads\yaf extractor.7z

                                      Filesize

                                      2.9MB

                                      MD5

                                      a9cfbf135122afe658e391d7e7c9eb84

                                      SHA1

                                      cd4da281d2c42427761f2c7c7a8e7a69ce834094

                                      SHA256

                                      8d6592b25c4e8bc1e21bfb665b9e93dfed1032354ae39874cfc124c30a5ef038

                                      SHA512

                                      00becc95be609dd8acb5f81c9b8bc957e07a91fbc66f754f005ff6415beb13cf4a39f18e58a7ad0692825c16a85f1c025c6fdaa04324a6652210f1381d672d76

                                    • C:\Users\Admin\Downloads\yaf extractor.7z:Zone.Identifier

                                      Filesize

                                      65B

                                      MD5

                                      1900eb98aa9a9c242098dfc3f8e8cc37

                                      SHA1

                                      b9aaccf15bdd2babbe1bdf5aa91e595651c7598a

                                      SHA256

                                      b815336ae77e2a2993088369af959f66934d50e51ee4d155bf573d02815cc34b

                                      SHA512

                                      9410fe6c09b38999756c176a021fbffc7b63a9eb0ed443559a7f3926a49cbb813cf3fc4d4ef48880e9c5e4881ecb5fa33f40ed79c8ab26e958400a182e7138ab

                                    • C:\Users\Admin\Downloads\yaf\mingwm10.dll

                                      Filesize

                                      15KB

                                      MD5

                                      60622fe5cd2decfb12c110e8b2b31893

                                      SHA1

                                      a999f021f6af60056185cba0d653b3001c913cb0

                                      SHA256

                                      15e64dbea73be5a44650f10780d8709fdbc41ec3ce695cef5c2bf67e58247909

                                      SHA512

                                      5adb38c03209d62604f7590edc305f5275426ddaad4f77b70c723a8bd196546bd1e1393ac1203a58003f60624844fe6126c70a7b75cbb2d7fe0a7f8cc30b0dd2

                                    • memory/4224-243-0x000000006FBC0000-0x000000006FBC8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/4224-242-0x0000000000400000-0x0000000000C8A000-memory.dmp

                                      Filesize

                                      8.5MB

                                    • memory/4224-244-0x0000000000400000-0x0000000000C8A000-memory.dmp

                                      Filesize

                                      8.5MB

                                    • memory/4224-246-0x0000000000400000-0x0000000000C8A000-memory.dmp

                                      Filesize

                                      8.5MB