Analysis
-
max time kernel
131s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2025 19:52
Static task
static1
Behavioral task
behavioral1
Sample
UNIROD-RFQ-010625001.exe
Resource
win10v2004-20241007-en
General
-
Target
UNIROD-RFQ-010625001.exe
-
Size
1.1MB
-
MD5
14640c06f8494da0aac5be1cb00865e0
-
SHA1
3bec66d765e049fcb93f99b7ebf1d6a8f57366f9
-
SHA256
2195099bea2aa33cf3a585bc1ac1c22ce10b2ca5bf8ea9cf0fe1e041cc9945ac
-
SHA512
77b08c292c86ec2b989b36da656f161532c60a1a16cbd888b4700f227269f34e00be001883a4fb5c6e51cf485d72196aecef048a831665fd6eb45920772939da
-
SSDEEP
24576:Gw6yj+R7ydItm/2uQAGYDKAVcpzWc4ctu:GDBR2KTYDKArc4Ku
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/3484-3-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-22-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-23-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-27-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-26-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-24-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-25-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-41-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-74-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-75-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-85-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-84-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-82-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-81-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-79-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-77-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-76-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-73-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-71-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-69-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-68-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-63-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-62-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-60-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-59-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-57-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-54-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-52-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-51-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-50-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-32-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-48-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-47-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-46-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-83-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-44-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-80-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-43-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-78-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-42-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-72-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-40-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-70-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-67-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-65-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-37-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-64-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-61-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-58-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-56-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-34-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-55-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-33-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-49-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-45-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-39-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-38-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-36-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-35-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-30-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 behavioral1/memory/3484-28-0x00000000028F0000-0x00000000038F0000-memory.dmp modiloader_stage2 -
Executes dropped EXE 1 IoCs
pid Process 3428 jphwmyiA.pif -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Aiymwhpj = "C:\\Users\\Public\\Aiymwhpj.url" UNIROD-RFQ-010625001.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3484 set thread context of 3428 3484 UNIROD-RFQ-010625001.exe 116 -
Program crash 1 IoCs
pid pid_target Process procid_target 4884 3428 WerFault.exe 116 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UNIROD-RFQ-010625001.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 27 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3372 msedge.exe 3372 msedge.exe 4496 msedge.exe 4496 msedge.exe 2808 identity_helper.exe 2808 identity_helper.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe 4496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4496 wrote to memory of 1196 4496 msedge.exe 96 PID 4496 wrote to memory of 1196 4496 msedge.exe 96 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 1044 4496 msedge.exe 98 PID 4496 wrote to memory of 3372 4496 msedge.exe 99 PID 4496 wrote to memory of 3372 4496 msedge.exe 99 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100 PID 4496 wrote to memory of 3212 4496 msedge.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\UNIROD-RFQ-010625001.exe"C:\Users\Admin\AppData\Local\Temp\UNIROD-RFQ-010625001.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Public\Libraries\FX.cmd2⤵
- System Location Discovery: System Language Discovery
PID:5188
-
-
C:\Users\Public\Libraries\jphwmyiA.pifC:\Users\Public\Libraries\jphwmyiA.pif2⤵
- Executes dropped EXE
PID:3428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 123⤵
- Program crash
PID:4884
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffec68d46f8,0x7ffec68d4708,0x7ffec68d47182⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:5200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:5328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:5792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3768 /prefetch:82⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3768 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,1661032344851970718,14026004810884146015,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1344 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:64
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3428 -ip 34281⤵PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
5KB
MD5389a9d254fac3eb7999a7a56d582d5f6
SHA1f5f9267b3a3004363813ae58960bc98001df432b
SHA256124052baf222c264ec7ae368f17c4fca7daba4d63cd051769b00b3a98accb642
SHA512fb60a6ba53a9c97c30bbdff763d667da9603e19d4ad5bd66ddb4737c5e9657c428cfa4338ed955bd01bac6758174d327cf533ba8ae641909ef19b073a3da191a
-
Filesize
6KB
MD5e8f0abb9137935a6714c83474eb0de53
SHA1056492d2edc66c8d66305eb4b1b0f51a12dc1189
SHA256a58f9ff2c590f1770426010a96bf36125baa43afd3a0a8d608ad00952093def6
SHA512fc7871680fc3fa2a27917b9fc58c7115a5039090ca4faa15a95e6bf2ca4e400466776b0cf081221db8fa490e64e8babe0c77b0c46d1bc1f9284ee372355ba396
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5d68ee6100bee6e251a30baa5ae474cfe
SHA1edaf22f82a868206f4849f4e2d5279f6b93727bb
SHA256380d41d3570b374d72bd24a2812ac07ac5afec8614d0ac81efb9f924420f9910
SHA512c10b33cb7fdc8df1d1a62660078d875bdfa0657a072b36ca893613893426758aeddb090ec1590dcb16b3dc9b3ae206ef1d9c02d9100babd66f081e495a7cdc7d
-
Filesize
10KB
MD5b21e9fc58823636a3ffdec40226a4405
SHA1ea2c4b85d0ba34d882c1ccb23dc7a4c963ba52f7
SHA2565d640ea3616232d0f00993ff61f49ba82259bbc42432bdc8921b8e6077d20057
SHA5129af657b33852c91b0dfa5cdb316009c56bb0d460e57ddbd6ebfba5fcffec50feb12ba2b0e9eb565052721c452bd13dfc66d5becfb4ef9b961fdf7d1c09fd69b0
-
Filesize
8KB
MD560cd0be570decd49e4798554639a05ae
SHA1bd7bed69d9ab9a20b5263d74921c453f38477bcb
SHA256ca6a6c849496453990beceef8c192d90908c0c615fa0a1d01bcd464bad6966a5
SHA512ab3dbdb4ed95a0cb4072b23dd241149f48ecff8a69f16d81648e825d9d81a55954e5dd9bc46d3d7408421df30c901b9ad1385d1e70793fa8d715c86c9e800c57
-
Filesize
171KB
MD522331abcc9472cc9dc6f37faf333aa2c
SHA12a001c30ba79a19ceaf6a09c3567c70311760aa4
SHA256bdfa725ec2a2c8ea5861d9b4c2f608e631a183fca7916c1e07a28b656cc8ec0c
SHA512c7f5baad732424b975a426867d3d8b5424aa830aa172ed0ff0ef630070bf2b4213750e123a36d8c5a741e22d3999ca1d7e77c62d4b77d6295b20a38114b7843c