File name:

[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windo....rar

Full analysis: https://app.any.run/tasks/f0da22d5-260b-44cc-bcc3-dab873ebb730
Verdict: Malicious activity
Analysis date: May 12, 2024, 13:33:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

F17D40E54D1D327690F61BD6E5BE6292

SHA1:

E151FD1D57A6F477C4E67B833CCA9A8E5B8CEDA7

SHA256:

1AF39C598DAA1F09ADB1046AEF0D5B214DF4A89F94780E11606002C91024A040

SSDEEP:

24576:oI7UQxwcda2YBbKtGZmnKeueqKX4qbbhmrbYrXlhNrc59EPI/Q:oI7UQxwQa2YBbKtGZmnKeueqKX4qbbhF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts Visual C# compiler

      • powershell.exe (PID: 1604)
      • powershell.exe (PID: 1368)
    • Drops the executable file immediately after the start

      • csc.exe (PID: 1800)
      • csc.exe (PID: 1044)
    • Creates a writable file in the system directory

      • cmd.exe (PID: 2460)
    • Starts NET.EXE for service management

      • net.exe (PID: 2336)
      • cmd.exe (PID: 2460)
  • SUSPICIOUS

    • Uses .NET C# to load dll

      • powershell.exe (PID: 1604)
      • powershell.exe (PID: 1368)
    • Probably obfuscated PowerShell command line is found

      • cmd.exe (PID: 660)
      • cmd.exe (PID: 1820)
    • Starts POWERSHELL.EXE for commands execution

      • cmd.exe (PID: 660)
      • cmd.exe (PID: 2244)
      • cmd.exe (PID: 2700)
      • cmd.exe (PID: 2816)
      • cmd.exe (PID: 2460)
      • cmd.exe (PID: 2972)
      • cmd.exe (PID: 2980)
      • cmd.exe (PID: 3788)
      • cmd.exe (PID: 3900)
      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 676)
      • cmd.exe (PID: 2452)
      • cmd.exe (PID: 2972)
      • cmd.exe (PID: 972)
    • Possibly malicious use of IEX has been detected

      • cmd.exe (PID: 660)
      • cmd.exe (PID: 1820)
    • The process bypasses the loading of PowerShell profile settings

      • cmd.exe (PID: 660)
      • cmd.exe (PID: 2244)
      • cmd.exe (PID: 2700)
      • cmd.exe (PID: 2816)
      • cmd.exe (PID: 2460)
      • cmd.exe (PID: 2972)
      • cmd.exe (PID: 2980)
      • cmd.exe (PID: 3788)
      • cmd.exe (PID: 3900)
      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 676)
      • cmd.exe (PID: 972)
      • cmd.exe (PID: 2452)
      • cmd.exe (PID: 2972)
    • Executable content was dropped or overwritten

      • csc.exe (PID: 1800)
      • expand.exe (PID: 1932)
      • xcopy.exe (PID: 1548)
      • csc.exe (PID: 1044)
      • expand.exe (PID: 1344)
      • xcopy.exe (PID: 2548)
    • Process drops legitimate windows executable

      • expand.exe (PID: 1932)
      • xcopy.exe (PID: 1548)
      • expand.exe (PID: 1344)
      • xcopy.exe (PID: 2548)
    • Executing commands from a ".bat" file

      • cmd.exe (PID: 660)
      • powershell.exe (PID: 2232)
      • cmd.exe (PID: 1820)
      • powershell.exe (PID: 2076)
    • Application launched itself

      • cmd.exe (PID: 660)
      • cmd.exe (PID: 2460)
      • cmd.exe (PID: 1820)
      • cmd.exe (PID: 972)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 660)
      • powershell.exe (PID: 2232)
      • cmd.exe (PID: 2460)
      • cmd.exe (PID: 1820)
      • powershell.exe (PID: 2076)
      • cmd.exe (PID: 972)
    • Powershell scripting: start process

      • cmd.exe (PID: 2244)
      • cmd.exe (PID: 676)
    • Reads the Internet Settings

      • powershell.exe (PID: 2232)
      • cmd.exe (PID: 2460)
      • wscript.exe (PID: 2360)
      • WMIC.exe (PID: 3412)
      • WMIC.exe (PID: 324)
      • WMIC.exe (PID: 1576)
      • WMIC.exe (PID: 936)
      • WMIC.exe (PID: 2412)
      • WMIC.exe (PID: 2400)
      • WMIC.exe (PID: 2748)
      • WMIC.exe (PID: 916)
      • powershell.exe (PID: 2076)
      • cmd.exe (PID: 972)
      • wscript.exe (PID: 2364)
      • WMIC.exe (PID: 1012)
    • The executable file from the user directory is run by the CMD process

      • center.exe (PID: 2548)
      • center.exe (PID: 2516)
    • The process executes VB scripts

      • cmd.exe (PID: 2460)
      • cmd.exe (PID: 972)
    • Creates FileSystem object to access computer's file system (SCRIPT)

      • wscript.exe (PID: 2360)
      • wscript.exe (PID: 2364)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 2360)
      • wscript.exe (PID: 2364)
    • Blank space has been found in the path

      • cmd.exe (PID: 2460)
      • cmd.exe (PID: 972)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 2460)
      • cmd.exe (PID: 972)
    • Uses WMIC.EXE to obtain computer system information

      • cmd.exe (PID: 2460)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2460)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 2460)
    • Hides command output

      • cmd.exe (PID: 1704)
      • cmd.exe (PID: 1552)
      • cmd.exe (PID: 2240)
      • cmd.exe (PID: 2104)
      • cmd.exe (PID: 2556)
      • cmd.exe (PID: 2020)
      • cmd.exe (PID: 928)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 2460)
      • cmd.exe (PID: 2076)
      • cmd.exe (PID: 2780)
    • Uses WMIC.EXE to obtain service application data

      • cmd.exe (PID: 1868)
    • Uses REG/REGEDIT.EXE to modify registry

      • cmd.exe (PID: 2460)
  • INFO

    • Manual execution by a user

      • cmd.exe (PID: 660)
      • cmd.exe (PID: 1820)
    • Checks supported languages

      • mode.com (PID: 692)
      • csc.exe (PID: 1800)
      • cvtres.exe (PID: 1836)
      • mode.com (PID: 2240)
      • mode.com (PID: 2340)
      • mode.com (PID: 2468)
      • mode.com (PID: 676)
      • center.exe (PID: 2548)
      • DisableX.exe (PID: 2708)
      • mode.com (PID: 2892)
      • mode.com (PID: 2944)
      • mode.com (PID: 3144)
      • mode.com (PID: 1932)
      • mode.com (PID: 4032)
      • csc.exe (PID: 1044)
      • mode.com (PID: 2080)
      • cvtres.exe (PID: 1012)
      • mode.com (PID: 1408)
      • mode.com (PID: 2512)
      • center.exe (PID: 2516)
      • DisableX.exe (PID: 2620)
      • mode.com (PID: 2816)
      • mode.com (PID: 2552)
      • mode.com (PID: 3260)
    • Create files in a temporary directory

      • csc.exe (PID: 1800)
      • cvtres.exe (PID: 1836)
      • expand.exe (PID: 1932)
      • xcopy.exe (PID: 1548)
      • csc.exe (PID: 1044)
      • cvtres.exe (PID: 1012)
      • expand.exe (PID: 1344)
      • xcopy.exe (PID: 2548)
    • Reads the machine GUID from the registry

      • csc.exe (PID: 1800)
      • cvtres.exe (PID: 1836)
      • csc.exe (PID: 1044)
      • cvtres.exe (PID: 1012)
    • Script raised an exception (POWERSHELL)

      • powershell.exe (PID: 1604)
      • powershell.exe (PID: 1368)
    • Drops the executable file immediately after the start

      • expand.exe (PID: 1932)
      • xcopy.exe (PID: 1548)
      • expand.exe (PID: 1344)
      • xcopy.exe (PID: 2548)
    • Checks operating system version

      • cmd.exe (PID: 2460)
    • Reads Microsoft Office registry keys

      • reg.exe (PID: 1548)
      • reg.exe (PID: 2832)
      • reg.exe (PID: 3284)
      • reg.exe (PID: 3268)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
268
Monitored processes
218
Malicious processes
6
Suspicious processes
8

Behavior graph

Click at the process to see the details
start winrar.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs mode.com no specs powershell.exe no specs csc.exe cvtres.exe no specs expand.exe xcopy.exe mode.com no specs cmd.exe no specs reg.exe no specs powershell.exe no specs cmd.exe mode.com no specs mode.com no specs powershell.exe no specs cmd.exe no specs mode.com no specs center.exe no specs wscript.exe no specs disablex.exe no specs cmd.exe no specs powershell.exe no specs powershell.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs choice.exe no specs mode.com no specs reg.exe no specs cmd.exe no specs powershell.exe no specs cmd.exe no specs powershell.exe no specs mode.com no specs cmd.exe no specs choice.exe no specs choice.exe no specs reg.exe no specs find.exe no specs wmic.exe no specs find.exe no specs cmd.exe no specs findstr.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs find.exe no specs reg.exe no specs find.exe no specs cmd.exe no specs sc.exe no specs cmd.exe no specs find.exe no specs sc.exe no specs sc.exe no specs find.exe no specs sc.exe no specs find.exe no specs sc.exe no specs find.exe no specs icacls.exe no specs find.exe no specs icacls.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs mode.com no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs cmd.exe no specs reg.exe no specs wmic.exe no specs findstr.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs wmic.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs cmd.exe no specs wmic.exe no specs wmic.exe no specs findstr.exe no specs wmic.exe no specs findstr.exe no specs wmic.exe no specs findstr.exe no specs findstr.exe no specs wmic.exe no specs wmic.exe no specs cmd.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs sc.exe no specs find.exe no specs net.exe no specs net1.exe no specs find.exe no specs sc.exe no specs sc.exe no specs find.exe no specs sc.exe no specs find.exe no specs icacls.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs reg.exe no specs sc.exe no specs cmd.exe no specs powershell.exe no specs powershell.exe no specs cmd.exe no specs mode.com no specs cmd.exe no specs choice.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs mode.com no specs powershell.exe no specs csc.exe cvtres.exe no specs expand.exe xcopy.exe cmd.exe no specs mode.com no specs reg.exe no specs powershell.exe no specs cmd.exe mode.com no specs mode.com no specs powershell.exe no specs cmd.exe no specs mode.com no specs center.exe no specs wscript.exe no specs disablex.exe no specs cmd.exe no specs powershell.exe no specs cmd.exe no specs powershell.exe no specs mode.com no specs cmd.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs findstr.exe no specs choice.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
116reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sppsvc.exe" /f /v KMS_RenewalInterval /t REG_DWORD /d 43200 C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
304reg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sppsvc.exe" /f /v VerifierFlags /t REG_DWORD /d 0x80000000 C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
324wmic path SoftwareLicensingProduct where (Description like '%KMSCLIENT%' ) get Name /value C:\Windows\System32\wbem\WMIC.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
WMI Commandline Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\wbem\wmic.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
368C:\Windows\system32\cmd.exe /c time /tC:\Windows\System32\cmd.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
588reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\osppsvc.exe" /f /v Debugger C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
600findstr "1" C:\Windows\System32\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\imm32.dll
660C:\Windows\system32\cmd.exe /c ""C:\Users\admin\Desktop\[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windows & Office Activation]\EN\KMS_Suite.v9.4.EN.bat" "C:\Windows\System32\cmd.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
255
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
660reg delete "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f" /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
664reg delete "HKU\S-1-5-20\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform\55c92734-d682-4d71-983e-d6ec3f16059f" /f C:\Windows\System32\reg.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Registry Console Tool
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\reg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
676mode con cols=92 lines=35C:\Windows\System32\mode.comcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
DOS Device MODE Utility
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\mode.com
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ulib.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
46 892
Read events
46 794
Write events
80
Delete events
18

Modification events

(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3988) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windo....rar
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3988) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
Executable files
56
Suspicious files
32
Text files
87
Unknown types
5

Dropped files

PID
Process
Filename
Type
3988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3988.12857\[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windows & Office Activation]\0. Websites you may like\2. OneHack.us Premium Cracked Accounts-Tutorials-Guides-Articles Community Based Forum.urlurl
MD5:652E4DE93DEDB74E3D6F2ADEEB44A171
SHA256:00C58BD155DE3AE6F9A32820E0BFF71847D80EE623ED09CF59E3C63EAA18E16E
3988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3988.12857\[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windows & Office Activation]\Readme.txttext
MD5:1DAB7853DBBED7BFFE4584CA1DFC4DB8
SHA256:F4137E9003953CA3C715C386110C81B744FBB82A78C38DB6E867404EB5E71151
3988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3988.12857\[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windows & Office Activation]\FTUApps.com Download Cracked Developers Applications For Free.urlurl
MD5:708A581C8010D315C99C5ED36512CA2C
SHA256:0F5746A7B0CD0A4904117B92F1330FBBA1981BFFF6AA8913C6EC19C0FF7F65B6
3988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3988.12857\[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windows & Office Activation]\0. Websites you may like\1. Get Free Premium Accounts Daily On Our Discord Server!.txttext
MD5:7E2BC71B046D54FDE236216919E007D2
SHA256:5151A0DA914EAE36575D3A7764F29E6948C8D6A3181A599AAEB555F78DC47D82
3988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3988.12857\[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windows & Office Activation]\EN\KMS_Suite.v9.4.EN.battext
MD5:D89B73628837F9B1DED1CCE801D1C342
SHA256:238797E00B9C9BC81CB5209BB7A149EFCED89C60D6B84E530884657DDA4FF513
1800csc.exeC:\Users\admin\AppData\Local\Temp\12r5rbvc.outtext
MD5:665C1EC6D487D29BE97E87871CEBB386
SHA256:311BC623DEB617BCDEC26A609429E818E1DC5F24E8990A2599C852F2D1D4546C
1800csc.exeC:\Users\admin\AppData\Local\Temp\12r5rbvc.dllexecutable
MD5:BD465396D98A4FF9261212C4C57BF2D4
SHA256:3C36059FDC2FC82B787C94F5ED5C8F0613D0C41B74F96C53DADFD8C29ECA0C69
3988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3988.12857\[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windows & Office Activation]\TR\KMS_Suite.v9.4.TR.battext
MD5:BD1C2A91640014B0DC15356CA3A3790B
SHA256:C4D71A21C4D6A9F6149B70A6F3A2531ECCEE397DD6001C7967779E5D3A0E16E2
3988WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3988.12857\[FTUApps.com] - KMS-2038 & Digital & Online Activation Suite v9.4 [Windows & Office Activation]\0. Websites you may like\3. FreeCoursesOnline.me Download Udacity, Masterclass, Lynda, PHLearn, etc Free.urltext
MD5:B11719861C961BD7891B7A9E566357B8
SHA256:DB5B8E46981BD65DC885BB6B33E4D5017C8F8C24A86783E3F3C2219AAC03A5BA
1604powershell.exeC:\Users\admin\AppData\Local\Temp\vc2cwnqu.vh1.ps1binary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
3
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
unknown
4
System
192.168.100.255:138
unknown
224.0.0.252:5355
unknown

DNS requests

No data

Threats

No threats detected
No debug info