Analysis

  • max time kernel
    122s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/02/2025, 13:18

General

  • Target

    SForceSetup.exe

  • Size

    65.4MB

  • MD5

    e19b379aa011e29475b52fa032be6fb1

  • SHA1

    5e667d088d0a35a5ef6b303aa44d91182cf2f77d

  • SHA256

    fc917a43cd242a370ba5a80e3fc5cc6c3e8dd0e7b68148452e1df864c4a2492e

  • SHA512

    c4c61eb548dbf6c98a23a1f0dd4b72aa82156cd10e9934ff786a3ae4dc4f5d6c8ad1e2610c944498eb53e0f0fd14dd12a6a3a769bdf16518ce39efaccad7124d

  • SSDEEP

    1572864:mji/jrpWcvi/jrpWQsyGADgl5AQllPnu19xKSkJAoM8Md9lZmP0UMG:mO/O/syG6glTlPnu8SkOoMTlsP08

Malware Config

Signatures

  • Detects HijackLoader (aka IDAT Loader) 1 IoCs
  • HijackLoader

    HijackLoader is a multistage loader first seen in 2023.

  • Hijackloader family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 24 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 22 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • outlook_office_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SForceSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\SForceSetup.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i "C:\Users\Admin\AppData\Roaming\SF Studios\Strike 1.0.0\install\Strike.x64.msi" AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\SForceSetup.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1740508111 "
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      PID:3868
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 06848CF293533974BD38A3E3A59D510D C
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1568
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      2⤵
        PID:4000
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 0430672C47F8313479FC79295C812577
        2⤵
        • Loads dropped DLL
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:4968
      • C:\Windows\Installer\MSICD40.tmp
        "C:\Windows\Installer\MSICD40.tmp"
        2⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4360
        • C:\Users\Admin\AppData\Local\Temp\Rhizopod\RTLogReceiver.exe
          "C:\Users\Admin\AppData\Local\Temp\Rhizopod\RTLogReceiver.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1276
          • C:\Users\Admin\AppData\Roaming\systemWatcher_v3\RTLogReceiver.exe
            C:\Users\Admin\AppData\Roaming\systemWatcher_v3\RTLogReceiver.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3432
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\SysWOW64\cmd.exe
              5⤵
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of WriteProcessMemory
              PID:4980
              • C:\Users\Admin\AppData\Local\Temp\ToolBeacon_3.exe
                C:\Users\Admin\AppData\Local\Temp\ToolBeacon_3.exe
                6⤵
                • Loads dropped DLL
                • Accesses Microsoft Outlook profiles
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                • outlook_office_path
                PID:1268
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory="Default"
                  7⤵
                  • Enumerates system info in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of WriteProcessMemory
                  PID:2772
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff7a5546f8,0x7fff7a554708,0x7fff7a554718
                    8⤵
                      PID:3476
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
                      8⤵
                        PID:1440
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:3
                        8⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3612
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:8
                        8⤵
                          PID:2076
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
                          8⤵
                            PID:1452
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                            8⤵
                              PID:668
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:1
                              8⤵
                                PID:2744
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3964 /prefetch:1
                                8⤵
                                  PID:4340
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:8
                                  8⤵
                                    PID:3684
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5312 /prefetch:8
                                    8⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3688
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:1
                                    8⤵
                                      PID:2112
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                                      8⤵
                                        PID:1360
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,8099336891397073052,2915618315025919376,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:1
                                        8⤵
                                          PID:5208
                            • C:\Windows\Installer\MSID06E.tmp
                              "C:\Windows\Installer\MSID06E.tmp" "C:\Program Files\SF Studios\Strike\StrikeAssistant.exe"
                              2⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5068
                          • C:\Windows\system32\vssvc.exe
                            C:\Windows\system32\vssvc.exe
                            1⤵
                            • Checks SCSI registry key(s)
                            PID:552
                          • C:\Program Files\SF Studios\Strike\StrikeAssistant.exe
                            "C:\Program Files\SF Studios\Strike\StrikeAssistant.exe"
                            1⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of WriteProcessMemory
                            PID:2924
                            • C:\Users\Admin\AppData\Local\Temp\is-G0G4S.tmp\StrikeAssistant.tmp
                              "C:\Users\Admin\AppData\Local\Temp\is-G0G4S.tmp\StrikeAssistant.tmp" /SL5="$4020C,10574003,121344,C:\Program Files\SF Studios\Strike\StrikeAssistant.exe"
                              2⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of WriteProcessMemory
                              PID:4852
                              • C:\Program Files\SF Studios\Strike\StrikeAssistant.exe
                                "C:\Program Files\SF Studios\Strike\StrikeAssistant.exe" /verysilent /password=31g1o
                                3⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of WriteProcessMemory
                                PID:2100
                                • C:\Users\Admin\AppData\Local\Temp\is-BRM7H.tmp\StrikeAssistant.tmp
                                  "C:\Users\Admin\AppData\Local\Temp\is-BRM7H.tmp\StrikeAssistant.tmp" /SL5="$801D8,10574003,121344,C:\Program Files\SF Studios\Strike\StrikeAssistant.exe" /verysilent /password=31g1o
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of FindShellTrayWindow
                                  • Suspicious use of WriteProcessMemory
                                  PID:3840
                                  • C:\Windows\SysWOW64\msiexec.exe
                                    "msiexec.exe" -i "C:\Users\Admin\AppData\Local\Temp\is-I3UNU.tmp\Java.msi" -qn
                                    5⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2460
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:2196
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4548

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Config.Msi\e57becf.rbs

                                Filesize

                                1KB

                                MD5

                                d384abc79aa5d4465535f37dfcfabf0f

                                SHA1

                                a26e5df67224aaa095c6c83d1e8e58869e4b0c67

                                SHA256

                                34613958b02b4c68147dac558bda88cb4f49ffd6389f547c725d107d8c7ededc

                                SHA512

                                7f16f01dfdf1c0b910ff6b87502c30f399d5bd9e7c138ee3e75dae2bd92c373d27445cd8c10684d4107e3932554b33165410127d3feb66a139ecb88bd6254fd9

                              • C:\Program Files\SF Studios\Strike\StrikeAssistant.exe

                                Filesize

                                10.5MB

                                MD5

                                b6d2b51d3391834b707e155a93e80fed

                                SHA1

                                758e502c2f7c5bb2e4824a6217852a3012005070

                                SHA256

                                9bdd6089f70e9569c6c1158184fe815b9babda33211f67d058248a3ce6c9b49c

                                SHA512

                                21fd9876365b2c20bdd964fbf73daa10f54b929b2ceb39220e9c3d0b2795b20d468718266e3868a850da6043879e8a43528604669a84d312c01e66da78e9f035

                              • C:\Users\Admin\AppData\Local\AdvinstAnalytics\67bccea84512a1c62dbce056\1.0.0\tracking.ini

                                Filesize

                                84B

                                MD5

                                15e66eb26ec5458b8f78f98eab53bdfa

                                SHA1

                                ec501992a3df1c972e032f9529ba7748e1311085

                                SHA256

                                40921505433a178e20431d046f645c2ddb61037c61593df1418051d81e3dbb42

                                SHA512

                                f3c83bdc7e2d6aee00b1209233851bbf8693453b516e466944b0474d5f2d2e63686be8dfd21f9879527b2591051b22e0b3d6c133c9f103f2db2b7b72334f59a4

                              • C:\Users\Admin\AppData\Local\AdvinstAnalytics\67bccea84512a1c62dbce056\1.0.0\tracking.ini

                                Filesize

                                84B

                                MD5

                                66f31cb85fb5c1e34bfece5970488d06

                                SHA1

                                233760235eb81a919b8553e4ea86deb1ee634ba6

                                SHA256

                                90f66a838bf364559ed3a4e2c01c85b5fb2e0d6a9ca01ead755bb4cc5bcd1552

                                SHA512

                                4bd49a29db14b8254f406fd8cca01cd5bfb23836deb65b3781b347ecf419e8961d4d19e97eea1d3d3581bb553e967b7ee0e20192315b37a82ef20a5f80a1c7bb

                              • C:\Users\Admin\AppData\Local\AdvinstAnalytics\67bccea84512a1c62dbce056\1.0.0\{05176796-7D2A-47C3-B981-F687C5E6C2DF}.session

                                Filesize

                                12KB

                                MD5

                                b4d58f09246fddd3d552e3ff04af7ded

                                SHA1

                                ec8cb71efaffed8f4dbfab75f7ac794928afeebc

                                SHA256

                                be7163ded30e0e8eb0f70fb0456a75444beff2e02112f1102cd2d1acd4ff8e7a

                                SHA512

                                ca3440fb96e43dfa23ac8a6b1b8d197a5fab9edf576b3abb14e5c6502b05ecdb716eefd450203e7aacdb4c2c568999baa9a6317c5bd8204c95dff1cf6bc4dc4a

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                Filesize

                                152B

                                MD5

                                f09c5037ff47e75546f2997642cac037

                                SHA1

                                63d599921be61b598ef4605a837bb8422222bef2

                                SHA256

                                ba61197fff5ed487084790b869045ab41830bdf6db815503e8e064dd4e4df662

                                SHA512

                                280bff6eac4b2b4fe515696223f61531f6b507c4c863ad9eef5ab0b1d65d264eba74fb7c9314b6920922142b8ab7605792211fca11a9a9ef0fc2ae995bf4f473

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                6KB

                                MD5

                                7cb66c2baaec39c3b82f99bb3fc725d9

                                SHA1

                                02ec128783b6761f7fece9894787833d598a71f4

                                SHA256

                                b126ac43516238518920f257d48247db6c07a3918caaa016047b92875f59b01a

                                SHA512

                                2c476b6f337317e316152f2f224f46d7332e20bcc7f0e1eebf8932b46b580f90cb8e1f747ec0239272af8523cb6fcbaacf6d32aa8435c707735d5131ed87217f

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                Filesize

                                5KB

                                MD5

                                d2f22992271002cb6db7a709db8da8df

                                SHA1

                                adb78ec6f5084f935ff6664695f367dba51a414f

                                SHA256

                                fbd5c2f3ef38814751e0de8f4e5ce53576de061c5f644063b7b2db0df5f0705e

                                SHA512

                                09e01bf4611b5919475639d7ffcaa18a5f3fc3d93e70a92af750b0b895afa0dae3e7f3dd46e89a9a7bd6c72955fa89f72b298e0e2275c515b8b009fc5d516438

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                Filesize

                                16B

                                MD5

                                6752a1d65b201c13b62ea44016eb221f

                                SHA1

                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                SHA256

                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                SHA512

                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                Filesize

                                11KB

                                MD5

                                d6f6aa847abe5349d5a6a1db5030feb4

                                SHA1

                                2ef75456e680f0db6170243a1e61f3621c1144d8

                                SHA256

                                5a0cc3224837251d29c2ee36831458e01099ebe86be7f443ec069baa4abf33b8

                                SHA512

                                0f65b802b2bc9613f0875acaac02d452578229291bb86e1962dcde7952248b0666c9b0e4e3ed7b3eccc0ddbbc0055253663d63b07c377e077fd72abe7bc5a7b2

                              • C:\Users\Admin\AppData\Local\Temp\MSI8BF5.tmp

                                Filesize

                                719KB

                                MD5

                                89f70b588a48793450dd603b6cd4096f

                                SHA1

                                9b6509c031856c715d62853c4e93efbdf48d5aeb

                                SHA256

                                066c52ed8ebf63a33ab8290b7c58d0c13f79c14faa8bf12b1b41f643d3ebe281

                                SHA512

                                fb04c530430eea6149fd7216f64751e641394a66c0cb222f70c29361baa621a78f906e0adff19bd4cbe5de69edcea7e40bff7c2e068fd4dbd057ca6494db861a

                              • C:\Users\Admin\AppData\Local\Temp\MSI8CA3.tmp

                                Filesize

                                1.1MB

                                MD5

                                58c6476771f68f57661d0f6533cb70ef

                                SHA1

                                8080de39939f0a8f1e0c529cca30bf38b0e6abf2

                                SHA256

                                7eb240ef6e75de05b2a199bc55fdc8d13f467d5b4e58457011653312fffcc65f

                                SHA512

                                2b4b4e4466a7eea2d28631a80f257ced0a7263aa81c945105b793371534580dff1b66779bab36b9157b596c352c234a19c568e105faa1ba8681aa39feb5950c5

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\RTLogReceiver.exe

                                Filesize

                                216KB

                                MD5

                                38840d6bf71bcb609130ecdecd05b04c

                                SHA1

                                35a4a172ce8965f9d4b7a3dc000b1766acd74440

                                SHA256

                                edfff9609d930828a1c28ab4d78368ffa3e8bc34d5f47e588e70b7f6c1680fe6

                                SHA512

                                e9a9c1b41870254477a4302c7bea79ca0eea84a6b273f5edfbb2e829c500acbe2b10b7e96e2b707e231f7d488a37bc1b21ca6ad778128f9320f021b1e4c71940

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\cajeput.ai

                                Filesize

                                67KB

                                MD5

                                c8274e7a1e54ab9e65ff450476b2ae7b

                                SHA1

                                be4ddaeacc3d34631776107c4250fa93b44e676f

                                SHA256

                                bae570ad275e43dd5e5d5c45aeeeb4167af6528898d69d3594af3626f1f3df5b

                                SHA512

                                2510b387cc1dcb8bbd99aa3deb149fc0ea5fbdd30c698af1c3b9469ec4f16049ceda08e9d556a83bfc5026c27818d2dfb6b059256259c2f0376ac0e31de326f1

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\orpine.tar.gz

                                Filesize

                                4.3MB

                                MD5

                                8f7319af4316410a641a126c995714fd

                                SHA1

                                214abfe350b1f53b6d8baa5834aed4a54876fe7f

                                SHA256

                                382454c9b9d528d5cde26ea08880330af36d934ea432369158ea79af2d4da67c

                                SHA512

                                477b1a8fa1135084b439b421640ef59f55dc135daf93e46b7a2eda6b58fb65686b3e39bc16b2007be0bb56dd410b331a830fd025c098f451f3bb0d1ea7a4763a

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\rtl280.bpl

                                Filesize

                                12.3MB

                                MD5

                                fcdf410c77a83f042590c29280b39f52

                                SHA1

                                c702ff6526e509b22c5659e6f7eeee1a38909a9e

                                SHA256

                                08941c5fa519f9dffba137a2a4844e9063ed71bc0c881fb7643e67fb3e3ddb0a

                                SHA512

                                bc68982570c27c859d1eaa06191058d23889d10f25279eb2e8130af715a50e3fe1b0b7aceb5d64e90f7e102ba3aa4bdc6c2c7705bab4bd55e24d5f5884211fb7

                              • C:\Users\Admin\AppData\Local\Temp\Rhizopod\vcl280.bpl

                                Filesize

                                4.0MB

                                MD5

                                41f745514ccc1b9796d4f081f4f208b0

                                SHA1

                                028e2fa926e53717e7965654a8394f7cdbe4fa5b

                                SHA256

                                1e366b8288e06ef4511d987e8cc4a7f44e2757f99e1d6f03dedfb046b04ee8a4

                                SHA512

                                fe08e1c626989758e26a9bbcd1a815c462396fb3145723609ad0e6b7dcbe66ec6133acc13cea428dfb9a6660984e4cad2cc3035b4d341bd5a4fddc88f7266870

                              • C:\Users\Admin\AppData\Local\Temp\is-7S65M.tmp\_isetup\_iscrypt.dll

                                Filesize

                                2KB

                                MD5

                                a69559718ab506675e907fe49deb71e9

                                SHA1

                                bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                SHA256

                                2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                SHA512

                                e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                              • C:\Users\Admin\AppData\Local\Temp\is-G0G4S.tmp\StrikeAssistant.tmp

                                Filesize

                                1.1MB

                                MD5

                                90fc739c83cd19766acb562c66a7d0e2

                                SHA1

                                451f385a53d5fed15e7649e7891e05f231ef549a

                                SHA256

                                821bd11693bf4b4b2b9f3c196036e1f4902abd95fb26873ea6c43e123b8c9431

                                SHA512

                                4cb11ad48b7585ef1b70fac9e3c25610b2f64a16358cd51e32adcb0b17a6ab1c934aeb10adaa8e9ddf69b2e2f1d18fe2e87b49b39f89b05ea13aa3205e41296c

                              • C:\Users\Admin\AppData\Local\Temp\shiC217.tmp

                                Filesize

                                4.3MB

                                MD5

                                6c7cdd25c2cb0073306eb22aebfc663f

                                SHA1

                                a1eba8ab49272b9852fe6a543677e8af36271248

                                SHA256

                                58280e3572333f97a7cf9f33e8d31dc26a98b6535965ebd0bde82249fc9bf705

                                SHA512

                                17344e07b9e9b2cd6ae4237d7f310732462f9cbb8656883607d7a1a4090e869265f92a6da1718dee50b1375b91583de60c6bd9e7e8db6b6e45e33f4b894365d6

                              • C:\Users\Admin\AppData\Local\Temp\shiC2A5.tmp

                                Filesize

                                81KB

                                MD5

                                125b0f6bf378358e4f9c837ff6682d94

                                SHA1

                                8715beb626e0f4bd79a14819cc0f90b81a2e58ad

                                SHA256

                                e99eab3c75989b519f7f828373042701329acbd8ceadf4f3ff390f346ac76193

                                SHA512

                                b63bb6bfda70d42472868b5a1d3951cf9b2e00a7fadb08c1f599151a1801a19f5a75cfc3ace94c952cfd284eb261c7d6f11be0ebbcaa701b75036d3a6b442db2

                              • C:\Users\Admin\AppData\Roaming\SF Studios\Strike 1.0.0\install\Strike.x64.msi

                                Filesize

                                12.8MB

                                MD5

                                1ba830c405756533e7675ad7694d4b5e

                                SHA1

                                bc84326d094b7b8ece7dcadcb035f953fb63119f

                                SHA256

                                9a99725176c41c5397fa6fdbe37c4ef75ae8fa48833efea027d6e3bc07d9f9d5

                                SHA512

                                50f7a2acb905af624ca9ea25d6de9744c972fc950138a327242a97b590153830bee2129a27abc05d4503a394a8f613e9b1424c44c6dbd8a8dab71aeae91d6312

                              • C:\Users\Admin\AppData\Roaming\SF Studios\Strike 1.0.0\install\Strike1.cab

                                Filesize

                                36.3MB

                                MD5

                                dd71e57ad8613cdafbc9689cab8675d9

                                SHA1

                                7e0514211d091f829d9fd702b59eb23577b7f4cd

                                SHA256

                                1beea256784ae64734a3a8d17e8f07d91501b8b40727380386ac214800529c98

                                SHA512

                                1d343d0fca6d6e6682ef2b2717b6f50d0a1ecb2064637a3dc24a658af2c048602d788dcb29ace9ea5f2530034d213d97a978a05a5a54679d742937a33d98c992

                              • C:\Windows\Installer\MSIBF97.tmp

                                Filesize

                                1.0MB

                                MD5

                                806e65956064190d6154d5de5cc96a5e

                                SHA1

                                f2fa1b10dec6f4166b79e710d81147c9028c4198

                                SHA256

                                17f79990c5455ac18abbca13fcd8f8584518881487f9fedcbd7cbbdbe003c6f8

                                SHA512

                                ae72ec2fe5895ca5e9e44b6c5e677356f9b7ba342d686a59be42b16027013d4b7c8c83ed0530705d792ac7b5881d10ec72dff546c2ee3c1452372d363501c62f

                              • C:\Windows\Installer\MSIC4C0.tmp

                                Filesize

                                835KB

                                MD5

                                3fe648959c7496beb28a3638fcc2e944

                                SHA1

                                6c73ebcdf517e2b30ad90f046f50f9e64c7a636c

                                SHA256

                                e6d18685b2e231f9166909764c3b90bbc3c51f30736d18873166e5dc9133e290

                                SHA512

                                1be58c011987b67396e052d32b6b3576823d612e4e678a18641a55fb6159b32e106cadeeebc22f179aa07902e1bbf517cc10d1ebf7233bf68fe198de3f20bca2

                              • C:\Windows\Installer\MSICD40.tmp

                                Filesize

                                8.2MB

                                MD5

                                6d4274f7b0ce245e587a5268f13dfbe4

                                SHA1

                                55b02e546d95f1d2ef84c1bbc2977813cfccfcce

                                SHA256

                                b480fec95b84980e88e0e5958873b7194029ffbaa78369cfe5c0e4d64849fb32

                                SHA512

                                f991f6beb57b55309466b8c180bce3c21c89c570ba427e57e081fb68c6c81fac10f601c8cfcf57300964888aa577c88ee07e6a4377aa89e20289436654636169

                              • C:\Windows\Installer\MSID06E.tmp

                                Filesize

                                404KB

                                MD5

                                f9bae6c70bcb6b029c7da5c54fe6d5c2

                                SHA1

                                24b7186a4d4b9187561ace5b35c3bc86132891b8

                                SHA256

                                0bcaec25d9840cbd4e0270e2679e1a28be25e995153c339c646da2933a21ac66

                                SHA512

                                c335b1623af57e58e219853460f8ed9cb7717fbf17209caec8396866004bf0a0512a8308e2377871fccff1d3d5169ba4054a879c9383a192aefb30a309689647

                              • memory/1268-431-0x00007FF7EA5E0000-0x00007FF7EA8F5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1268-417-0x00007FF7EA5E0000-0x00007FF7EA8F5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1268-430-0x00007FF7EA5E0000-0x00007FF7EA8F5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1268-369-0x00007FF7EA5E0000-0x00007FF7EA8F5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1268-368-0x00007FF7EA5E0000-0x00007FF7EA8F5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1268-357-0x00007FF7EA5E0000-0x00007FF7EA8F5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1268-363-0x00007FF7EA5E0000-0x00007FF7EA8F5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1268-358-0x00007FF7EA5E0000-0x00007FF7EA8F5000-memory.dmp

                                Filesize

                                3.1MB

                              • memory/1276-292-0x00000000005B0000-0x00000000005E8000-memory.dmp

                                Filesize

                                224KB

                              • memory/1276-272-0x0000000071470000-0x00000000715EB000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/1276-277-0x00007FFF97CD0000-0x00007FFF97EC5000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/1276-293-0x0000000050050000-0x0000000050CA7000-memory.dmp

                                Filesize

                                12.3MB

                              • memory/1276-295-0x0000000050CB0000-0x00000000510C2000-memory.dmp

                                Filesize

                                4.1MB

                              • memory/2100-303-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/2100-336-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/2924-270-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/2924-311-0x0000000000400000-0x0000000000428000-memory.dmp

                                Filesize

                                160KB

                              • memory/3432-337-0x0000000071230000-0x00000000713AB000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/3432-305-0x0000000071230000-0x00000000713AB000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/3432-308-0x00007FFF97CD0000-0x00007FFF97EC5000-memory.dmp

                                Filesize

                                2.0MB

                              • memory/3432-339-0x0000000000600000-0x0000000000638000-memory.dmp

                                Filesize

                                224KB

                              • memory/3432-340-0x0000000050050000-0x0000000050CA7000-memory.dmp

                                Filesize

                                12.3MB

                              • memory/3840-335-0x0000000000400000-0x000000000052D000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/4852-307-0x0000000000400000-0x000000000052D000-memory.dmp

                                Filesize

                                1.2MB

                              • memory/4980-352-0x0000000071230000-0x00000000713AB000-memory.dmp

                                Filesize

                                1.5MB

                              • memory/4980-342-0x00007FFF97CD0000-0x00007FFF97EC5000-memory.dmp

                                Filesize

                                2.0MB