Analysis
-
max time kernel
138s -
max time network
156s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
23/02/2025, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
Start10ThemeEdit.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Start10ThemeEdit.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
Start10ThemeEdit.exe
Resource
win11-20250217-en
General
-
Target
Start10ThemeEdit.exe
-
Size
660.7MB
-
MD5
c12dfa79c1d3ca0a3c3ed007a4f25564
-
SHA1
5fc6404fb8d78be78d76272b3c3c869f90198792
-
SHA256
94e8892bd96427806b523b9fe551bc639297aeb58267c58c4cb7980b36a517a5
-
SHA512
5fe1dda86201129915b0569e2793a7f17c4fbe7d0fc881f7a0e4390608ec6dd4369addb243ebc5c29011e1df72218f79cbd42aa53f896fb0958e572f4494d345
-
SSDEEP
393216:fkcbf0j8aPknFM7mqF6WEuDLEXgqqIv1MCNrrPgLX3wRHyN6:scj0PPknFymqXE8gXKkJrPgL6SE
Malware Config
Signatures
-
Detect Vidar Stealer 33 IoCs
resource yara_rule behavioral2/memory/4692-129-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-140-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-141-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-142-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-143-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-178-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-179-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-180-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-181-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-182-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-183-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-184-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-185-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-186-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-187-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-236-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-237-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-238-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-239-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-240-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-241-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-243-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-244-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-245-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-247-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-248-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-254-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-255-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-256-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-257-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-258-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-259-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 behavioral2/memory/4692-260-0x0000000003220000-0x0000000003242000-memory.dmp family_vidar_v7 -
Vidar family
-
Downloads MZ/PE file 1 IoCs
flow pid Process 105 4692 Start10ThemeEdit.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2648 chrome.exe 4964 msedge.exe 4488 msedge.exe 3236 msedge.exe 656 chrome.exe 2984 chrome.exe 1540 msedge.exe 2264 msedge.exe 3200 chrome.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1786400979-876203093-3022739302-1000\Control Panel\International\Geo\Nation Start10ThemeEdit.tmp Key value queried \REGISTRY\USER\S-1-5-21-1786400979-876203093-3022739302-1000\Control Panel\International\Geo\Nation Start10ThemeEdit.exe Key value queried \REGISTRY\USER\S-1-5-21-1786400979-876203093-3022739302-1000\Control Panel\International\Geo\Nation dj5xlfcjm7.tmp -
Executes dropped EXE 8 IoCs
pid Process 2360 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 4692 Start10ThemeEdit.exe 3276 dj5xlfcjm7.exe 2684 dj5xlfcjm7.tmp 4040 dj5xlfcjm7.exe 3060 dj5xlfcjm7.tmp 2060 AutoIt3.exe -
Loads dropped DLL 8 IoCs
pid Process 2360 Start10ThemeEdit.tmp 2360 Start10ThemeEdit.tmp 2360 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 2684 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1786400979-876203093-3022739302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\celloidin = "\"C:\\55eb9c04-b40c-4b87-ac10-8f52e7284088\\Autoit3.exe\" \"C:\\55eb9c04-b40c-4b87-ac10-8f52e7284088\\celloidin.a3x\"" AutoIt3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Start10ThemeEdit.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Start10ThemeEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dj5xlfcjm7.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AutoIt3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Start10ThemeEdit.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Start10ThemeEdit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dj5xlfcjm7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dj5xlfcjm7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dj5xlfcjm7.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Start10ThemeEdit.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Start10ThemeEdit.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Start10ThemeEdit.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2680 timeout.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133847940983643444" chrome.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 3980 Start10ThemeEdit.tmp 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 3200 chrome.exe 3200 chrome.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4776 msedge.exe 4776 msedge.exe 1540 msedge.exe 1540 msedge.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 4692 Start10ThemeEdit.exe 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 3060 dj5xlfcjm7.tmp 2060 AutoIt3.exe 2060 AutoIt3.exe 2060 AutoIt3.exe 2060 AutoIt3.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe Token: SeShutdownPrivilege 3200 chrome.exe Token: SeCreatePagefilePrivilege 3200 chrome.exe -
Suspicious use of FindShellTrayWindow 53 IoCs
pid Process 3980 Start10ThemeEdit.tmp 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 3200 chrome.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 1540 msedge.exe 3060 dj5xlfcjm7.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3504 wrote to memory of 2360 3504 Start10ThemeEdit.exe 79 PID 3504 wrote to memory of 2360 3504 Start10ThemeEdit.exe 79 PID 3504 wrote to memory of 2360 3504 Start10ThemeEdit.exe 79 PID 2360 wrote to memory of 2152 2360 Start10ThemeEdit.tmp 80 PID 2360 wrote to memory of 2152 2360 Start10ThemeEdit.tmp 80 PID 2360 wrote to memory of 2152 2360 Start10ThemeEdit.tmp 80 PID 2152 wrote to memory of 3980 2152 Start10ThemeEdit.exe 81 PID 2152 wrote to memory of 3980 2152 Start10ThemeEdit.exe 81 PID 2152 wrote to memory of 3980 2152 Start10ThemeEdit.exe 81 PID 3980 wrote to memory of 4692 3980 Start10ThemeEdit.tmp 82 PID 3980 wrote to memory of 4692 3980 Start10ThemeEdit.tmp 82 PID 3980 wrote to memory of 4692 3980 Start10ThemeEdit.tmp 82 PID 4692 wrote to memory of 3200 4692 Start10ThemeEdit.exe 85 PID 4692 wrote to memory of 3200 4692 Start10ThemeEdit.exe 85 PID 3200 wrote to memory of 4452 3200 chrome.exe 86 PID 3200 wrote to memory of 4452 3200 chrome.exe 86 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 3316 3200 chrome.exe 87 PID 3200 wrote to memory of 2588 3200 chrome.exe 88 PID 3200 wrote to memory of 2588 3200 chrome.exe 88 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89 PID 3200 wrote to memory of 3032 3200 chrome.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe"C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\is-0T904.tmp\Start10ThemeEdit.tmp"C:\Users\Admin\AppData\Local\Temp\is-0T904.tmp\Start10ThemeEdit.tmp" /SL5="$50230,15291586,119296,C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe"C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe" /VERYSILENT3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\is-MQM9A.tmp\Start10ThemeEdit.tmp"C:\Users\Admin\AppData\Local\Temp\is-MQM9A.tmp\Start10ThemeEdit.tmp" /SL5="$50240,15291586,119296,C:\Users\Admin\AppData\Local\Temp\Start10ThemeEdit.exe" /VERYSILENT4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Roaming\{2836644D-224C-4C95-892D-5D57DDC11073}\Start10ThemeEdit.exe"C:\Users\Admin\AppData\Roaming\{2836644D-224C-4C95-892D-5D57DDC11073}\Start10ThemeEdit.exe" allodial.a3x5⤵
- Downloads MZ/PE file
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffafb32cc40,0x7ffafb32cc4c,0x7ffafb32cc587⤵PID:4452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1872,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1868 /prefetch:27⤵PID:3316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2180 /prefetch:37⤵PID:2588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2480 /prefetch:87⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3208 /prefetch:17⤵
- Uses browser remote debugging
PID:656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3212,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3256 /prefetch:17⤵
- Uses browser remote debugging
PID:2648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4292,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4300 /prefetch:17⤵
- Uses browser remote debugging
PID:2984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4720,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4712 /prefetch:87⤵PID:540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4732,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4820 /prefetch:87⤵PID:4532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4848,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4708 /prefetch:87⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,16408033217434093518,4783176308171226548,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4984 /prefetch:87⤵PID:3560
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffafb7d46f8,0x7ffafb7d4708,0x7ffafb7d47187⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:27⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:87⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:17⤵
- Uses browser remote debugging
PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:17⤵
- Uses browser remote debugging
PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:17⤵
- Uses browser remote debugging
PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2068,13002864093416248647,13157157507657039391,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:17⤵
- Uses browser remote debugging
PID:3236
-
-
-
C:\ProgramData\dj5xlfcjm7.exe"C:\ProgramData\dj5xlfcjm7.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\is-J5KEI.tmp\dj5xlfcjm7.tmp"C:\Users\Admin\AppData\Local\Temp\is-J5KEI.tmp\dj5xlfcjm7.tmp" /SL5="$B0238,13414214,119296,C:\ProgramData\dj5xlfcjm7.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2684 -
C:\ProgramData\dj5xlfcjm7.exe"C:\ProgramData\dj5xlfcjm7.exe" /VERYSILENT8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\is-9AC91.tmp\dj5xlfcjm7.tmp"C:\Users\Admin\AppData\Local\Temp\is-9AC91.tmp\dj5xlfcjm7.tmp" /SL5="$10006A,13414214,119296,C:\ProgramData\dj5xlfcjm7.exe" /VERYSILENT9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3060 -
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\AutoIt3.exe"C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\AutoIt3.exe" celloidin.a3x10⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2060 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"11⤵PID:1832
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Roaming\{2836644D-224C-4C95-892D-5D57DDC11073}\Start10ThemeEdit.exe" & rd /s /q "C:\ProgramData\1no8g" & exit6⤵
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Windows\SysWOW64\timeout.exetimeout /t 107⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2680
-
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3800
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.0MB
MD531c1980129a020ffd2836386ec757229
SHA101da59330c87adcc026aec2ff17695917ca61475
SHA256b0094fc915f2cca6534fa7edc48ae1e400687e4aea032b9a6f0e626331b573cd
SHA512cc876005cf9ba5878069a542c89507cded8159402c6a4402bb10ca7ee3f9a6c613c1ba101836e8463ebf36249ebef923132d7bc8ad490d2e36c80d234861c7b7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD59091da214c5c97c04dfbd4afc733ec2f
SHA1680c48d5c7cdf8b85d12d76e5b5af7d9ccf452b7
SHA256565c816ea4b9387afdda41c0fc27e21ff9ae434cdca28af87483a29408d85f68
SHA5125a561d5ebba54af22f33471f622ece68d4d9ba7e7a4f5b6848122aeb9ce07e51e9a56c1357165a5a7daabd03ecd8244b5759b893660958fe5d9264f7cbca0bee
-
Filesize
5KB
MD5bd023af53a4cc087d05a6b76279bfcc5
SHA1c304433ca0d5b9a7742f0d2de467ff0e4e02ff64
SHA25601aec64eaa384e936b5dc9562ef43098992311c76327fa3de37e048d52c254e8
SHA5120e56bdc721b25424c3ff7a44405cafd3c48721cfc4611295b35210c84ed18a3d32d6176094b6a7529e104b9be04118554f6785e0cbd5315b147d3857bd4a32de
-
Filesize
112KB
MD5e03fc0ff83fdfa203efc0eb3d2b8ed35
SHA1c705b1aa42d84b3414fdc5058e0fa0a3dc9e1664
SHA25608d550d1866b479c6c41ebbda7b453dba198ee8744a52c530ff34458024ee1fe
SHA512c0840930d7a9cf16e8fbefefd09c564eabfcfb6e9df1f9b906b830e8218a818c3f9721f9ce1fc2a96b2e6ce725baba0dcd5810a9b55d20b3c9d6f4569b9008a2
-
Filesize
1.1MB
MD5b1f9d665e52c29972b50d7145d88dce1
SHA1df2c67a5c32a19bb110ec8372134522c0dab9ac2
SHA2562ffabb0018d335267d2d0101a41cac7ac7d1aa80956fae91825e46aaa85c0787
SHA512bcdce189402ffc1c17b9803ac4040bd1cb23e32ba2c1476cbcfae13438078e01f78ad3f76e1bf71a6ec204663aa5f5780990016fc074218763d63db1431f1e75
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
385KB
MD5cb99bbdea56a7e08c8b475bcecd5df41
SHA15c9eb462054c8242b2a9f69b3e5d27c6a1daa0f6
SHA2568ed926351e3c5acfffd5d3890b17d5d96990b7ccbdfc4e549df46ef963d52f88
SHA512829e7b7e6cce4cf6b50438e451f4bbf3eabfe827c641fb2bef3808609267aa79dcdb987a569ee71b85a702953fa7861bb6b7e00f07efd18829391f32574dc4d9
-
Filesize
877KB
MD584784ef516d810edd01e7ec2775246e1
SHA17b6a9b90031270bd4868af5ab5e7175ab30d5efa
SHA25665077d9942193aa89e119b86ed6e26cbed159acb13faaae6e6503aea0564e780
SHA5124906c8f0633d948c7157ed71b58b83f5469259ce8b89ed7c5c2d3f0945781e73a8474901a0246e04d0da1ef9a861f1523d1f3c87f5924bdeef0363581e3e2b48
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
385KB
MD5f31b31d462d008b2f319cf9fa5b3744e
SHA10b5e96edbf7a4afe7cd52b0ee7e0a29ba72b4939
SHA25620508054642d0d5030760095b6210fa88ca10288764a77683ac2bcb9d0d4cd43
SHA512400edbfd2c4b66fcf91076685f379858717a60eeb1836cda01a5b2bfb1501229b57a48673b916c8acfabaf212be3bf0ced096431b9a5130f391efb8be239648b
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\DiagnosticsHub.StandardCollector.Bridge.dll
Filesize290KB
MD5ae1ee814db6be02481a5bb7d031760c0
SHA1996ee493ddda8114d2957a1f6d0299e8e2be6ab6
SHA256eeae37ec39a65b44309c973703a31bbf85ff13aa0b38e1668ded3455c5b55b1d
SHA51294cd63e65c628d25d600cf0d7cc49d6dda7bce79ac6f4319dca91c45713c2d3764f1410453ef27f779ebda2550f0493b7f9468ce60a27a6eff6676307f44d9bc
-
Filesize
334KB
MD57804edfa6e74df21c23efa1fbb52116b
SHA151eea741f5e1bcda5ac96dd46e3a2e9ce9f5309b
SHA256fa903f2ff8a566c7728c8f2ac42409607cb1ef1519b9f9d3591a4656f095f8df
SHA5121b8a181da013ee74a3f49a7ad2104c5b3817e7d7d1dc2e155210c5965b8c6179e034d635e418a0861d5ba563542cb03835ab6877daa77b26eb9eb97ccdc43e4c
-
Filesize
226KB
MD54b815e44d94d38438b90c3198797c0a5
SHA1d29d9ca4f66e13c66eeb3e53332670f777252597
SHA2560c80df2fdc238ddc66b5ae493a9dea395f03b828fdde4d6d90ffd76154d6ea03
SHA5128563c2b7d1c2ee48a9ae297d8ab9251ed18a896d1ff4b29b088f02393891bf28f888e7c6d5c7c6133069d18fe5bec37d936dce6ca83d5ca64b901296669fc74d
-
Filesize
22KB
MD5b7e5d9a2dc7e37d13dcfa24e7c81c0f8
SHA1f87bdda9ff570ff3d53cdfa3393b7a2d826b8dda
SHA256b51eb89d1dfb794095e98fbf1b87373006a1bc6dda6fcebfc86402804c32f7c6
SHA5121a6af325524513b176d1a34c653b438a4f284f9079e9841ebaa27b025217027ec669189ea81b7d80b15e2de18b628f255822ae105ff40b7355dc9c071be9384c
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.Azure.Management.Monitor.Fluent.dll
Filesize763KB
MD51e2cbea517a43333ff2a9543b87784fc
SHA138a3b0eafc3ba9a14e980a370a9035dacb6729b8
SHA256eba1024441cd2801652b02e9bf60813cff30b7fac68e31f055e056ac75135d6e
SHA512151a10fa1e52c1aae768afc1da936c03de50025cd6b65d4dbd43c3d586f3921fc23bc96d08b06ecd185f432f89b254c6810701138b286e98885b785d728fc206
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.CodeAnalysis.VisualBasic.CodeStyle.Fixes.dll
Filesize216KB
MD5ebe72cf87ea6cdc8f2ad4ffb9dcec178
SHA14c721340878eb8c33622eccf47eb449c46b55f48
SHA256fb63d2ea793babc1b30f4cf35d323ec17e493b60c138814ca8193d6ba0b188e3
SHA51260d2440c0cb5ee30a7c7b77782bb4b6977d45c732d6029cd7debf4f5a6d8330256a4d02c8a0c11f6e3f46b4f2a2ba09e7e439d2d98e0a33272a3304650a5b88a
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.Office.BusinessData.dll
Filesize933KB
MD55f20cc1396134d409fb641cc6f78623c
SHA1bd7643e4b22859524bc5efcb61df5e5c52daea6e
SHA256c8b9ba1cd9cb779ab9553fde17ae145e3d90b283fb2fdd1c01cef7091970c514
SHA512231a1b7c5ea47cedc35c0d09ac62a2d8057548091cf1ddf44b145791d687c40dfb707cac800c334cb655ab589e9119fd03339db65f5846ef83ce82d660c276e1
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.VisualC.ProjectStore.Implementation.dll
Filesize1.1MB
MD54ee2f7bf87f129f0cdc25962cd10db98
SHA1cb180413d4c1b69e3b7a52b7e2ba519eb0e4fd23
SHA256b8d584deef1e17a9e54e7059dde7e0f9be6189fd9fb4eb3bbc4d80195439cbeb
SHA5126d4a5fa140d941b3f0759092c46eda432521c26a49895fdf2c6852480e005c476105398cc686a2cbf24e8c2f8fabefb43d79833369fa7850e3cae5c4d801e746
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.VisualStudio.JavaScript.ProjectSystem.resources.dll
Filesize425KB
MD54284df6b52b471072e4ac3bc5c91e9d6
SHA1a41b9b1c6d5e3db10182929740b5b82ff8747e3e
SHA2561e9cf8c5fdabbbffaa5cfe428cf356cab98afdc3466d7337b0bb0c595178de9f
SHA5128e6f73ff43ed8ef80609196eed68c5eb7f0db13c9b8fd56caefdb6b6c4ad9e44f3b265296195c4b88c1333bc27bc5baad0ffff157614a45e30d3fd0c682aaed4
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\Microsoft.VisualStudio.Shell.Framework.dll
Filesize344KB
MD56e34dc8152c7ef22eeec636260e85d4f
SHA179c4b597eff147c377103ae1a57d900209cf50ba
SHA2560d2d0ab2940589ee413cc67206bcbc358b2938f7d7375e6b268c7094f394b4c3
SHA5129769239eec06433d25ecf37782dcd26265f1526dbce287274a46615e9fea5604f350cf54fb9d4569a8f5121e95ca1106fbddbea241c7265bc9a427b9f4a0a01c
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\MicrosoftInstrumentationEngine_x86.dll
Filesize1.2MB
MD53c3f7793c563b205807e6a64f3d09c56
SHA1c30fefcdc4a2f251b139154519bfcc649ed762c2
SHA256164844e7e460fa93bb5a1ded8dfcd66644a017d426bfab5214389e2591000842
SHA5126336e82def733f1169458ace00099b252829e84fbbdd21b2b07a4dc4718a42cf7af94953f8853b162c90d5861d589426be070c0e60d5f5b167d87adf4c3d11c3
-
Filesize
371KB
MD50c64f7c44299d6c60dddd35f3b3a8dcb
SHA11342926985f9d2405949ddf1e64fb36efc3182c0
SHA2566ca448432389259852d5f5a5a134ffc593d9e1b3c5d8b37afeeb22979cf6fc6c
SHA512d4663983721eab36832a267ab49ab65839b44b8d51f5760654e31e07a73cf357938e546ae48a7913457a59a4885be54914d8e259755f859d9b979ad0beef0e1a
-
Filesize
1.0MB
MD51d65c9c904886e50c31fbcb33105b29b
SHA1ebd619c3f2b2d701c83e476b0f81d2ef8c6df628
SHA256d7be17d190bb74e981c06fab244a0bd901dccd1dd872c524db48693e33d36bd6
SHA5121aed6815249a459ff1f19cce68a636f8ff3d7bdff2a82bcf161abafa541db3bd9716339a6bdf88253a048a2d8bbf8ef37458fe64d2da78cfbb3e5d9f8f457916
-
Filesize
5.0MB
MD5d0a65c478eec14c640565ef4f7195aa7
SHA150d01a9425692f4d2240183e2f61ab1b25e72527
SHA256857e48b908a5f6c3e511b6597479e072a238810e901c2530c9b856bfc36318de
SHA512c79ec1f9cd077665a2328c03166dc86793495eb098f3bf2fc96adbbc198a3f98bee96daabf1207a620772681a6a0d4a7af341f45aea11ffd5970786ac92a1472
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\cpfecl.Clang.Windows.arm64.dll
Filesize432KB
MD58cea62007f23ec06224ced33fc635494
SHA117839da287796e36b4d2de0e3cd82e9e8cdda997
SHA256aac9b0827cebb37e9068e6087c9f1aa3bd5d94ee46d9cf63cae2e94784f61c32
SHA512e721b048f05e2c238e29f2c638d59bcd1855f5a93b8c1c2fe7334d90cd08858bbfa8cc6f7e9537b4f7ee5a1baca60d0c664f8ea0cadda9f43883cb0af655a9f0
-
Filesize
967KB
MD55f3c2683da9ee8ef7d6464cce1463f81
SHA119df76f2f2d6ba9fc099479e209e81f08b83c9c6
SHA256a9e676cb483c6aa45485ddcb3f01dcec52cd12906b71d6c97ae7a3bde931fbe4
SHA512e824f056ab022dbc08d55cf5860ac9989d9b6d786526988eb588ad91511193237132c846cbdddb3b0ecdc6e3ffea3a49ba1340d6321cec5b293432128a853648
-
Filesize
1.1MB
MD52c48f538acb4f796ac57c9ee48b77b75
SHA1f3dbdc1a09ebf384eca18489b89d3536cc85d7d5
SHA2563f7a220d9d988fbbf161c8979950ab58895550d411bb8e4a9ca83ead125abf25
SHA512903f2772225d36b700fc3ec9f4c0b1032b28da6500499bcfc0823d87056bbae3ad47806116fd63555546e29ebca352b0243730fc2dda6e12e877f782bc81bbf4
-
Filesize
273KB
MD54dcb8ab70f71fabb672186f5acb1ebe3
SHA184f9890d70c3002b15adeec18ec52e1ba72cfee1
SHA256acf669f5d665c1b42c8073069311de08a872d1b4121e0bf92eafb68e4424c057
SHA51231f9d73115265c72ee6b90d2a8020b6d95715a0f21081147fc7aeb49c1bc7f030c00e2bb1a1800d5b3901212834d9dc818ff196b4245f0547e5351f1d5ea3a71
-
C:\Users\Admin\AppData\Roaming\{A225B959-A37A-4A90-A8CC-60F084F9DBA4}\microsoft.visualstudio.graphics.dll
Filesize664KB
MD53722b171bcaaa0dd245b45de546ea6a6
SHA112de412117c3aef922b0c91bc8a147079ab45b8b
SHA256e30abd7d20980e6e5201a4ce5fb94f0492e0f31fc866627c7340c08b12ef2317
SHA5120d76f5b729a1e780e5e196a1cb6f96aae1fa655b0cfacce22ee1701765c8e90d0614fd8ab5e2f2a2ed530e69670f894627cbf4bf3d0301bb5992cb088df54d83
-
Filesize
322KB
MD5ed88025353ef136babc0b1030eddc0a4
SHA1dd433e935562034d61dbd06eda9b8e2193085e79
SHA25699bcbc6dd04b0add980a1b272e5ffa4cf0b017e65a65a3653e727be36594257e
SHA512f9b210deab51e31036f3c03775df438f3f9152e8defd239a5d6d70b3b46fea8f3127410b174735656d5ca3f1c0c4e494764cffcf2b3422b79c40f0544b99d8ec
-
Filesize
566KB
MD599128d32f7b0e4296d73fb424faf9106
SHA181dbeb05db64d5f0fc2abf62b7a763e0cff65fa6
SHA256fcdadfb4aaf985df247cbbbe3761072e303832db9b1fcdd2379552c0d0fb8971
SHA5120ddc593b4e006fcd3a0945037996373c9db6cb024c7da013b661241cd51b25fc370ca2560817488a0d3612e813ef198466f4a025dc02ce14f19fcf6ce72dc101
-
Filesize
683KB
MD5c346dca20fb65853c5d5e0026390091a
SHA1cc985c0edfd450a0c0b85f0521de46eb61b21adb
SHA256c2a84abdf647e4a3f1671b33806f0283257627fe91c717bcd0eac14cced0b00d
SHA512778cccab5f0ba187f77bec54ac1ca43b2930aba1a387e98b142671a30419b40400f1eadaa280a6bc899c50f64027db661a9e2bb43fee1006125b242cfcb4408a
-
Filesize
990KB
MD5cdc9a614e6ecaa0e238b9e6c2ed5ae4d
SHA1289914c1237fbbe3e985a4cb9db791d3b1479712
SHA2568fef7e737753988494524014bf4e1d06a2f4487e6412d8cd1be0a08110ff0c83
SHA512987ba4cb1da3c827bf83888371119f4946ae96d91d68144f23238615c03bd17795037218f8165809c02d33d6c3cac64e4ec8133a2607262e2b485b974fd821f8
-
Filesize
629KB
MD59329ea78784a291fff3df9ee815b76aa
SHA154d71341e7255d8e885e9b038f67d14a3b0d916d
SHA2563c2a22cf3c712491afdd83afe5db6c0ec79eb2102bf6949389d784e084d84d96
SHA512a57fb3af2424a6efb63caeaa5eaa3f07aeea67fb1ef26d2a867ceef70f815845bf360bd7bc142c4bf33278037b1a413d68fa688b39e03b2948576c1e4cf4ab58