Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250217-en
  • resource tags

    arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/02/2025, 13:12

General

  • Target

    SForceSetup.exe

  • Size

    65.4MB

  • MD5

    e19b379aa011e29475b52fa032be6fb1

  • SHA1

    5e667d088d0a35a5ef6b303aa44d91182cf2f77d

  • SHA256

    fc917a43cd242a370ba5a80e3fc5cc6c3e8dd0e7b68148452e1df864c4a2492e

  • SHA512

    c4c61eb548dbf6c98a23a1f0dd4b72aa82156cd10e9934ff786a3ae4dc4f5d6c8ad1e2610c944498eb53e0f0fd14dd12a6a3a769bdf16518ce39efaccad7124d

  • SSDEEP

    1572864:mji/jrpWcvi/jrpWQsyGADgl5AQllPnu19xKSkJAoM8Md9lZmP0UMG:mO/O/syG6glTlPnu8SkOoMTlsP08

Malware Config

Signatures

  • Detects HijackLoader (aka IDAT Loader) 1 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Hijackloader family
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 25 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 26 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SForceSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\SForceSetup.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\SF Studios\Strike 1.0.0\install\Strike.x64.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\SForceSetup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1740507871 "
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:2032
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 80724A2B34008EDCF158C512639CC264 C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3240
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4868
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding B1820E1752A538CD67944B3C4D3049B5
        2⤵
        • Loads dropped DLL
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:2216
      • C:\Windows\Installer\MSIAB12.tmp
        "C:\Windows\Installer\MSIAB12.tmp"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3228
        • C:\Users\Admin\AppData\Local\Temp\Rhizopod\RTLogReceiver.exe
          "C:\Users\Admin\AppData\Local\Temp\Rhizopod\RTLogReceiver.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4704
          • C:\Users\Admin\AppData\Roaming\systemWatcher_v3\RTLogReceiver.exe
            C:\Users\Admin\AppData\Roaming\systemWatcher_v3\RTLogReceiver.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:4484
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\SysWOW64\cmd.exe
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:3472
              • C:\Users\Admin\AppData\Local\Temp\ToolBeacon_3.exe
                C:\Users\Admin\AppData\Local\Temp\ToolBeacon_3.exe
                6⤵
                • Loads dropped DLL
                • Accesses Microsoft Outlook profiles
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                • outlook_office_path
                PID:1120
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory="Default"
                  7⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:4708
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffc2d8d3cb8,0x7ffc2d8d3cc8,0x7ffc2d8d3cd8
                    8⤵
                      PID:3196
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1884 /prefetch:2
                      8⤵
                        PID:860
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:3
                        8⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:1540
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:8
                        8⤵
                          PID:2060
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                          8⤵
                            PID:3124
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                            8⤵
                              PID:4112
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:1
                              8⤵
                                PID:4872
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3844 /prefetch:1
                                8⤵
                                  PID:3008
                                • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:8
                                  8⤵
                                    PID:4772
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5628 /prefetch:8
                                    8⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:448
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:8
                                    8⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4968
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1
                                    8⤵
                                      PID:3060
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:1
                                      8⤵
                                        PID:1896
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,7873748133309605853,10140761284046678522,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5816 /prefetch:1
                                        8⤵
                                          PID:1728
                            • C:\Windows\Installer\MSIACE8.tmp
                              "C:\Windows\Installer\MSIACE8.tmp" "C:\Program Files\SF Studios\Strike\StrikeAssistant.exe"
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2892
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Checks SCSI registry key(s)
                            PID:584
                          • C:\Program Files\SF Studios\Strike\StrikeAssistant.exe
                            "C:\Program Files\SF Studios\Strike\StrikeAssistant.exe"
                            1⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:1072
                            • C:\Users\Admin\AppData\Local\Temp\is-496Q2.tmp\StrikeAssistant.tmp
                              "C:\Users\Admin\AppData\Local\Temp\is-496Q2.tmp\StrikeAssistant.tmp" /SL5="$902CE,10574003,121344,C:\Program Files\SF Studios\Strike\StrikeAssistant.exe"
                              2⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:3496
                              • C:\Program Files\SF Studios\Strike\StrikeAssistant.exe
                                "C:\Program Files\SF Studios\Strike\StrikeAssistant.exe" /verysilent /password=31g1o
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:4420
                                • C:\Users\Admin\AppData\Local\Temp\is-0QB47.tmp\StrikeAssistant.tmp
                                  "C:\Users\Admin\AppData\Local\Temp\is-0QB47.tmp\StrikeAssistant.tmp" /SL5="$80278,10574003,121344,C:\Program Files\SF Studios\Strike\StrikeAssistant.exe" /verysilent /password=31g1o
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of WriteProcessMemory
                                  PID:1800
                                  • C:\Windows\SysWOW64\msiexec.exe
                                    "msiexec.exe" -i "C:\Users\Admin\AppData\Local\Temp\is-6SSD6.tmp\Java.msi" -qn
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:1564
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2652
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4764

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Config.Msi\e57a319.rbs

                                Filesize

                                1KB

                                MD5

                                951c935de625c9bf815282a3d9a627ff

                                SHA1

                                274234b1724061530d55c92bbf9804706250eaf2

                                SHA256

                                d927b65d31736179bd1a3b890149ebb0bd43e2c68d3138460bb4d42ae92fcff0

                                SHA512

                                1a58be832eb2514cf46c65f3b9a448c1a87a75e2b4035a1327b7963f3ec4b07ccc6ce5e0b62f5cf334b4af6864181a464c49c85fde1f991854cf607b6a4159d7

                              • C:\Program Files\SF Studios\Strike\StrikeAssistant.exe

                                Filesize

                                10.5MB

                                MD5

                                b6d2b51d3391834b707e155a93e80fed

                                SHA1

                                758e502c2f7c5bb2e4824a6217852a3012005070

                                SHA256

                                9bdd6089f70e9569c6c1158184fe815b9babda33211f67d058248a3ce6c9b49c

                                SHA512

                                21fd9876365b2c20bdd964fbf73daa10f54b929b2ceb39220e9c3d0b2795b20d468718266e3868a850da6043879e8a43528604669a84d312c01e66da78e9f035

                              • C:\Users\Admin\AppData\Local\AdvinstAnalytics\67bccea84512a1c62dbce056\1.0.0\tracking.ini

                                Filesize

                                84B

                                MD5

                                db36e909bcd226a77cf6fa5f0ce01e43

                                SHA1

                                9d22aaf36c3fb92fada97372181f8740d4c6fde9

                                SHA256

                                4255b1097551f7f509ba7b42d441ac34f60c02aa3ef010ad38c12c8aba76950a

                                SHA512

                                dc43116566f95585d37efcc140f3d984e3c614eb5aa1676737fc9248d336c1453b45a42e0ebe0df329bda90e87067a42198979d93ceef5eea8b3d1d7a79f21f9

                              • C:\Users\Admin\AppData\Local\AdvinstAnalytics\67bccea84512a1c62dbce056\1.0.0\tracking.ini

                                Filesize

                                84B

                                MD5

                                5ea12c5ffe49f35d61043adeaa277b2a

                                SHA1

                                c7edf5bfed5aeaf56e65e84c594f6f72b114c209

                                SHA256

                                55ae5736a5b3dd487c71ac3e983ee872c070ba2254ad97736f66661ae83922ed

                                SHA512

                                132f7e6da0712f8dffc9b2bc917cfdaf008fed0d37e87cc68196b411c6a7fb2e7c032c6ad1bf1e09334287db0a034cbbf27a3ac44e1d64cc971a64b1e74c710e

                              • C:\Users\Admin\AppData\Local\AdvinstAnalytics\67bccea84512a1c62dbce056\1.0.0\{74A8F957-CC57-4B21-AB48-261DBEEDDA25}.session

                                Filesize

                                32KB

                                MD5

                                8b9ec7bca60d8158f56087e0796293e6

                                SHA1

                                63740ebb83217d6d16ea1247ee97676aa52dfa6f

                                SHA256

                                1a5d5755223b7349fd933735c2b93c322f15dac1dbb747308c07c3a0d0da0c17

                                SHA512

                                fdcd1f6ff93e772e920c7c70f4352e4537cc74eb9d65024ea45dc0dde24794884a6633d00e4036cbb92343c7bf0ee313040011507cb2770ee8333f7082341ef5

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                e45a14e89fdf82756edc65c97e606e63

                                SHA1

                                42ce594393a4ce3b4e1c79dbe424841bd3f434c8

                                SHA256

                                49af9d716c69fb93ebee18e708f4ceaab99abf505abcbad1bd46c60ace03da9f

                                SHA512

                                6af0cabb253026d7613065e7274f8be114fc2cbd0134e8d518a417bf4b2b94ffc8b9c05be4e47685ac6d7246e28c11a86852ee4b6e934bf6c6d56b6c97428425

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                825fb95a70bf7b56cfcda1f118800f98

                                SHA1

                                15f1e212c1fb567c70ff4f716a4bba81f2857e0a

                                SHA256

                                2280c42f8ca4302a1d37d63532e3e981e33b596e3b2e930ce40b390dc0f09104

                                SHA512

                                987189b84f58e5d64b662f80f47ae797bcf46aeba86584cc17afabd2f25885a4cf48d80400154ba22eeee1131b84f882cd1998d1686ee12013218f52049bc6d7

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                3a65ba7a6544e4eb732d67b2674018ae

                                SHA1

                                1004b8ac59513c812ea9dea17220c63f25cd43ab

                                SHA256

                                1fb00e1409f2a69ae9d0496614a954e2209e8ea030160a59ede2c0b935812938

                                SHA512

                                f389afd2e72fafb4b5f9c0131d3d4810b32b94457d2b2d5b69bade6e1c462cb44628a0465c9cbab6a6dcd262e9a9e4071a74f3e7c3176e8f65a03d22a45e92e0

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                286edad62857ed2d9b6d4745a2f4a514

                                SHA1

                                05682a85df3c240efbb043ca788fc9b88f525890

                                SHA256

                                c9b27933668c31e66a84e04fc8e5fa7739d7c28d60c9d19f2540594a36d8875e

                                SHA512

                                573c05ba9aa8ee992ccb861d9df955f5db631323bdb55409355bd6f2ee37c01b8c47383c007deb7ceca9b139185daf3fdf31443384d5abdc51ab523260e7143a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                46295cac801e5d4857d09837238a6394

                                SHA1

                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                SHA256

                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                SHA512

                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                206702161f94c5cd39fadd03f4014d98

                                SHA1

                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                SHA256

                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                SHA512

                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                159c836079ea379b710dc76e05cabb88

                                SHA1

                                327e0c99d81b67223b4627cd731395d351a8b635

                                SHA256

                                1930df147fa66ad23df0698335895c6dbdfb466fe58317cf158e1d925a4513e0

                                SHA512

                                bc8807b802703f4280e4f7282304e597e73d5d73d70effd5f049f7ad74e8c850f911a641680f67f1d2954edc9df938f1a4afc74c0682e1431ebcdd24b3a84fe4

                              • C:\Users\Admin\AppData\Local\Temp\MSI7540.tmp

                                Filesize

                                719KB

                                MD5

                                89f70b588a48793450dd603b6cd4096f

                                SHA1

                                9b6509c031856c715d62853c4e93efbdf48d5aeb

                                SHA256

                                066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

                                SHA512

                                fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

                              • C:\Users\Admin\AppData\Local\Temp\MSI760E.tmp

                                Filesize

                                1.1MB

                                MD5

                                58c6476771f68f57661d0f6533cb70ef

                                SHA1

                                8080de39939f0a8f1e0c529cca30bf38b0e6abf2

                                SHA256

                                7eb240ef6e75de05b2a199bc55fdc8d13f467d5b4e58457011653312fffcc65f

                                SHA512

                                2b4b4e4466a7eea2d28631a80f257ced0a7263aa81c945105b793371534580dff1b66779bab36b9157b596c352c234a19c568e105faa1ba8681aa39feb5950c5

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\RTLogReceiver.exe

                                Filesize

                                216KB

                                MD5

                                38840d6bf71bcb609130ecdecd05b04c

                                SHA1

                                35a4a172ce8965f9d4b7a3dc000b1766acd74440

                                SHA256

                                edfff9609d930828a1c28ab4d78368ffa3e8bc34d5f47e588e70b7f6c1680fe6

                                SHA512

                                e9a9c1b41870254477a4302c7bea79ca0eea84a6b273f5edfbb2e829c500acbe2b10b7e96e2b707e231f7d488a37bc1b21ca6ad778128f9320f021b1e4c71940

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\cajeput.ai

                                Filesize

                                67KB

                                MD5

                                c8274e7a1e54ab9e65ff450476b2ae7b

                                SHA1

                                be4ddaeacc3d34631776107c4250fa93b44e676f

                                SHA256

                                bae570ad275e43dd5e5d5c45aeeeb4167af6528898d69d3594af3626f1f3df5b

                                SHA512

                                2510b387cc1dcb8bbd99aa3deb149fc0ea5fbdd30c698af1c3b9469ec4f16049ceda08e9d556a83bfc5026c27818d2dfb6b059256259c2f0376ac0e31de326f1

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\orpine.tar.gz

                                Filesize

                                4.3MB

                                MD5

                                8f7319af4316410a641a126c995714fd

                                SHA1

                                214abfe350b1f53b6d8baa5834aed4a54876fe7f

                                SHA256

                                382454c9b9d528d5cde26ea08880330af36d934ea432369158ea79af2d4da67c

                                SHA512

                                477b1a8fa1135084b439b421640ef59f55dc135daf93e46b7a2eda6b58fb65686b3e39bc16b2007be0bb56dd410b331a830fd025c098f451f3bb0d1ea7a4763a

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\rtl280.bpl

                                Filesize

                                12.3MB

                                MD5

                                fcdf410c77a83f042590c29280b39f52

                                SHA1

                                c702ff6526e509b22c5659e6f7eeee1a38909a9e

                                SHA256

                                08941c5fa519f9dffba137a2a4844e9063ed71bc0c881fb7643e67fb3e3ddb0a

                                SHA512

                                bc68982570c27c859d1eaa06191058d23889d10f25279eb2e8130af715a50e3fe1b0b7aceb5d64e90f7e102ba3aa4bdc6c2c7705bab4bd55e24d5f5884211fb7

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\vcl280.bpl

                                Filesize

                                4.0MB

                                MD5

                                41f745514ccc1b9796d4f081f4f208b0

                                SHA1

                                028e2fa926e53717e7965654a8394f7cdbe4fa5b

                                SHA256

                                1e366b8288e06ef4511d987e8cc4a7f44e2757f99e1d6f03dedfb046b04ee8a4

                                SHA512

                                fe08e1c626989758e26a9bbcd1a815c462396fb3145723609ad0e6b7dcbe66ec6133acc13cea428dfb9a6660984e4cad2cc3035b4d341bd5a4fddc88f7266870

                              • C:\Users\Admin\AppData\Local\Temp\is-496Q2.tmp\StrikeAssistant.tmp

                                Filesize

                                1.1MB

                                MD5

                                90fc739c83cd19766acb562c66a7d0e2

                                SHA1

                                451f385a53d5fed15e7649e7891e05f231ef549a

                                SHA256

                                821bd11693bf4b4b2b9f3c196036e1f4902abd95fb26873ea6c43e123b8c9431

                                SHA512

                                4cb11ad48b7585ef1b70fac9e3c25610b2f64a16358cd51e32adcb0b17a6ab1c934aeb10adaa8e9ddf69b2e2f1d18fe2e87b49b39f89b05ea13aa3205e41296c

                              • C:\Users\Admin\AppData\Local\Temp\is-66VJP.tmp\_isetup\_iscrypt.dll

                                Filesize

                                2KB

                                MD5

                                a69559718ab506675e907fe49deb71e9

                                SHA1

                                bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                SHA256

                                2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                SHA512

                                e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                              • C:\Users\Admin\AppData\Local\Temp\shiA539.tmp

                                Filesize

                                4.5MB

                                MD5

                                f3e7e0f26f7b44239f025e014ff7f67f

                                SHA1

                                6ee448271f8716547147674ced00c9c89c8270dc

                                SHA256

                                796824b4240d8ec77e739d4611a79ceda4a9b618143b2c6a3d0d12f20053e1f3

                                SHA512

                                1a590c313b56bd04e8f945650a13600c9eddc4bc33f252fd7eb8a7cf42ae285de906c93265e962229326dd24279db658351e7fff6446536e374a74c12f33915d

                              • C:\Users\Admin\AppData\Local\Temp\shiA53A.tmp

                                Filesize

                                85KB

                                MD5

                                9055f8ba2eb52ec3d998d9a10201227e

                                SHA1

                                bbbb67ed2c844f6b99824072a615317596ebe5cb

                                SHA256

                                be69a9ade29f36d5da7aeff9dcfc521cf226b3b8a9d99e465be9db3cc56143ae

                                SHA512

                                207b8c264cd73ec983ee431fd7647ab6e80d37bd3aec0a6ea4474540607e77ea75d8389cea20a18b7d312dcefb71d630bb96895793c1d106bab0f590a56cb7b8

                              • C:\Users\Admin\AppData\Roaming\SF Studios\Strike 1.0.0\install\Strike.x64.msi

                                Filesize

                                12.8MB

                                MD5

                                1ba830c405756533e7675ad7694d4b5e

                                SHA1

                                bc84326d094b7b8ece7dcadcb035f953fb63119f

                                SHA256

                                9a99725176c41c5397fa6fdbe37c4ef75ae8fa48833efea027d6e3bc07d9f9d5

                                SHA512

                                50f7a2acb905af624ca9ea25d6de9744c972fc950138a327242a97b590153830bee2129a27abc05d4503a394a8f613e9b1424c44c6dbd8a8dab71aeae91d6312

                              • C:\Users\Admin\AppData\Roaming\SF Studios\Strike 1.0.0\install\Strike1.cab

                                Filesize

                                36.3MB

                                MD5

                                dd71e57ad8613cdafbc9689cab8675d9

                                SHA1

                                7e0514211d091f829d9fd702b59eb23577b7f4cd

                                SHA256

                                1beea256784ae64734a3a8d17e8f07d91501b8b40727380386ac214800529c98

                                SHA512

                                1d343d0fca6d6e6682ef2b2717b6f50d0a1ecb2064637a3dc24a658af2c048602d788dcb29ace9ea5f2530034d213d97a978a05a5a54679d742937a33d98c992

                              • C:\Windows\Installer\MSIA42F.tmp

                                Filesize

                                1.0MB

                                MD5

                                806e65956064190d6154d5de5cc96a5e

                                SHA1

                                f2fa1b10dec6f4166b79e710d81147c9028c4198

                                SHA256

                                17f79990c5455ac18abbca13fcd8f8584518881487f9fedcbd7cbbdbe003c6f8

                                SHA512

                                ae72ec2fe5895ca5e9e44b6c5e677356f9b7ba342d686a59be42b16027013d4b7c8c83ed0530705d792ac7b5881d10ec72dff546c2ee3c1452372d363501c62f

                              • C:\Windows\Installer\MSIA7B3.tmp

                                Filesize

                                835KB

                                MD5

                                3fe648959c7496beb28a3638fcc2e944

                                SHA1

                                6c73ebcdf517e2b30ad90f046f50f9e64c7a636c

                                SHA256

                                e6d18685b2e231f9166909764c3b90bbc3c51f30736d18873166e5dc9133e290

                                SHA512

                                1be58c011987b67396e052d32b6b3576823d612e4e678a18641a55fb6159b32e106cadeeebc22f179aa07902e1bbf517cc10d1ebf7233bf68fe198de3f20bca2

                              • C:\Windows\Installer\MSIAB12.tmp

                                Filesize

                                8.2MB

                                MD5

                                6d4274f7b0ce245e587a5268f13dfbe4

                                SHA1

                                55b02e546d95f1d2ef84c1bbc2977813cfccfcce

                                SHA256

                                b480fec95b84980e88e0e5958873b7194029ffbaa78369cfe5c0e4d64849fb32

                                SHA512

                                f991f6beb57b55309466b8c180bce3c21c89c570ba427e57e081fb68c6c81fac10f601c8cfcf57300964888aa577c88ee07e6a4377aa89e20289436654636169

                              • C:\Windows\Installer\MSIACE8.tmp

                                Filesize

                                404KB

                                MD5

                                f9bae6c70bcb6b029c7da5c54fe6d5c2

                                SHA1

                                24b7186a4d4b9187561ace5b35c3bc86132891b8

                                SHA256

                                0bcaec25d9840cbd4e0270e2679e1a28be25e995153c339c646da2933a21ac66

                                SHA512

                                c335b1623af57e58e219853460f8ed9cb7717fbf17209caec8396866004bf0a0512a8308e2377871fccff1d3d5169ba4054a879c9383a192aefb30a309689647

                              • memory/1072-312-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/1072-272-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/1120-432-0x00007FF6CE4C0000-0x00007FF6CE7D5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1120-459-0x00007FF6CE4C0000-0x00007FF6CE7D5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1120-460-0x00007FF6CE4C0000-0x00007FF6CE7D5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1120-372-0x00007FF6CE4C0000-0x00007FF6CE7D5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1120-371-0x00007FF6CE4C0000-0x00007FF6CE7D5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1120-367-0x00007FF6CE4C0000-0x00007FF6CE7D5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1120-359-0x00007FF6CE4C0000-0x00007FF6CE7D5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1120-360-0x00007FF6CE4C0000-0x00007FF6CE7D5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1800-342-0x0000000000400000-0x000000000052D000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/3472-351-0x00007FFC3C4C0000-0x00007FFC3C6C9000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/3472-354-0x0000000071A00000-0x0000000071B7D000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/3496-309-0x0000000000400000-0x000000000052D000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/4420-343-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/4420-307-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/4484-310-0x00007FFC3C4C0000-0x00007FFC3C6C9000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/4484-335-0x0000000071A00000-0x0000000071B7D000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/4484-337-0x0000000000A90000-0x0000000000AC8000-memory.dmp

                                Filesize

                                224KB

                              • memory/4484-339-0x0000000050050000-0x0000000050CA7000-memory.dmp

                                Filesize

                                12.3MB

                              • memory/4484-303-0x0000000071A00000-0x0000000071B7D000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/4704-300-0x0000000000EE0000-0x0000000000F18000-memory.dmp

                                Filesize

                                224KB

                              • memory/4704-301-0x0000000050CB0000-0x00000000510C2000-memory.dmp

                                Filesize

                                4.1MB

                              • memory/4704-302-0x0000000050050000-0x0000000050CA7000-memory.dmp

                                Filesize

                                12.3MB

                              • memory/4704-281-0x00007FFC3C4C0000-0x00007FFC3C6C9000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/4704-275-0x0000000071A00000-0x0000000071B7D000-memory.dmp

                                Filesize

                                1.5MB