Analysis
-
max time kernel
149s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
02/04/2025, 06:38
Static task
static1
Behavioral task
behavioral1
Sample
PO_0908-0989989_Royal International Construction, L.L.C.cmd
Resource
win10v2004-20250314-en
General
-
Target
PO_0908-0989989_Royal International Construction, L.L.C.cmd
-
Size
4.4MB
-
MD5
4ccd9114110e590192b6ac291a44aa04
-
SHA1
82a21588f918e98c1624a80cc45a75984a1cdebc
-
SHA256
4d0f4d4b0c4be9677d69985483ef77988e997c47457b26a16609fcc89bad5242
-
SHA512
e0727284c96501044d1d881a03d6e58f0e020656e444a630e9edeef6e68934c243564d48394578a7ff89354771078245d5f3a22f4bdfa1b9e941fe27fad9ab36
-
SSDEEP
49152:JOZm8FVOULlD5339WohAl04mmVC5zVdcwn/eBoKzBHNsARFiB:E
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 61 IoCs
resource yara_rule behavioral1/memory/432-53-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-57-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-56-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-64-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-106-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-105-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-117-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-115-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-116-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-113-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-111-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-108-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-104-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-103-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-101-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-100-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-96-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-93-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-92-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-88-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-86-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-114-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-112-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-110-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-109-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-80-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-107-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-77-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-102-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-76-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-75-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-99-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-98-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-95-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-94-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-72-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-71-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-91-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-90-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-89-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-85-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-84-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-83-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-82-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-81-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-79-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-78-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-63-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-62-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-74-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-73-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-61-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-60-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-70-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-69-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-68-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-67-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-66-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-58-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-65-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 behavioral1/memory/432-59-0x0000000002A40000-0x0000000003A40000-memory.dmp modiloader_stage2 -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4300 powershell.exe -
Uses browser remote debugging 2 TTPs 14 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5152 Chrome.exe 4744 Chrome.exe 4376 Chrome.exe 404 Chrome.exe 3632 Chrome.exe 5008 Chrome.exe 2580 Chrome.exe 1620 msedge.exe 3768 Chrome.exe 4036 Chrome.exe 5024 Chrome.exe 2024 Chrome.exe 4636 msedge.exe 4548 msedge.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Control Panel\International\Geo\Nation rdha.pif -
Executes dropped EXE 12 IoCs
pid Process 1452 expha.pif 5504 expha.pif 5452 expha.pif 4552 alpha.pif 3752 ghf.pif 4412 alpha.pif 448 ghf.pif 4720 alpha.pif 3840 rdha.pif 432 chrome.PIF 1968 alpha.pif 5196 alpha.pif -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts recover.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2716 set thread context of 5016 2716 colorcpl.exe 136 PID 2716 set thread context of 1016 2716 colorcpl.exe 137 PID 2716 set thread context of 5592 2716 colorcpl.exe 138 -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\be\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\en_CA\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_1620_1972643975\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\offscreendocument_main.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\te\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\mn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\nl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\lt\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_metadata\verified_contents.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\hr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\fr_CA\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\fa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\is\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\zh_TW\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\ml\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\128.png msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\lv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\gu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\ar\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\ne\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping1620_1934958658\_locales\km\messages.json msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.PIF Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language alpha.pif Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language recover.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3320 PING.EXE 4720 alpha.pif 4840 PING.EXE -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry Chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133880495628974219" Chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-446031748-3036493239-2009529691-1000\{88DAC588-6E89-4E36-B933-0193CD4E9208} msedge.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4840 PING.EXE 3320 PING.EXE -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4300 powershell.exe 432 chrome.PIF 432 chrome.PIF 2716 colorcpl.exe 2716 colorcpl.exe 5016 recover.exe 5016 recover.exe 5592 recover.exe 5592 recover.exe 5152 Chrome.exe 5152 Chrome.exe 5016 recover.exe 5016 recover.exe 2716 colorcpl.exe 2716 colorcpl.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2716 colorcpl.exe 2716 colorcpl.exe 2716 colorcpl.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1620 msedge.exe 1620 msedge.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 4300 powershell.exe Token: SeDebugPrivilege 5592 recover.exe Token: SeShutdownPrivilege 5152 Chrome.exe Token: SeCreatePagefilePrivilege 5152 Chrome.exe Token: SeShutdownPrivilege 5152 Chrome.exe Token: SeCreatePagefilePrivilege 5152 Chrome.exe Token: SeShutdownPrivilege 5152 Chrome.exe Token: SeCreatePagefilePrivilege 5152 Chrome.exe Token: SeShutdownPrivilege 5152 Chrome.exe Token: SeCreatePagefilePrivilege 5152 Chrome.exe Token: SeShutdownPrivilege 5152 Chrome.exe Token: SeCreatePagefilePrivilege 5152 Chrome.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 5152 Chrome.exe 5152 Chrome.exe 1620 msedge.exe 1620 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5372 wrote to memory of 4300 5372 cmd.exe 86 PID 5372 wrote to memory of 4300 5372 cmd.exe 86 PID 5372 wrote to memory of 1272 5372 cmd.exe 87 PID 5372 wrote to memory of 1272 5372 cmd.exe 87 PID 5372 wrote to memory of 1452 5372 cmd.exe 88 PID 5372 wrote to memory of 1452 5372 cmd.exe 88 PID 5372 wrote to memory of 5504 5372 cmd.exe 89 PID 5372 wrote to memory of 5504 5372 cmd.exe 89 PID 5372 wrote to memory of 5452 5372 cmd.exe 90 PID 5372 wrote to memory of 5452 5372 cmd.exe 90 PID 5372 wrote to memory of 4552 5372 cmd.exe 91 PID 5372 wrote to memory of 4552 5372 cmd.exe 91 PID 4552 wrote to memory of 3752 4552 alpha.pif 93 PID 4552 wrote to memory of 3752 4552 alpha.pif 93 PID 5372 wrote to memory of 4412 5372 cmd.exe 95 PID 5372 wrote to memory of 4412 5372 cmd.exe 95 PID 4412 wrote to memory of 448 4412 alpha.pif 96 PID 4412 wrote to memory of 448 4412 alpha.pif 96 PID 5372 wrote to memory of 4720 5372 cmd.exe 97 PID 5372 wrote to memory of 4720 5372 cmd.exe 97 PID 4720 wrote to memory of 4840 4720 alpha.pif 99 PID 4720 wrote to memory of 4840 4720 alpha.pif 99 PID 5372 wrote to memory of 3840 5372 cmd.exe 104 PID 5372 wrote to memory of 3840 5372 cmd.exe 104 PID 3840 wrote to memory of 432 3840 rdha.pif 105 PID 3840 wrote to memory of 432 3840 rdha.pif 105 PID 3840 wrote to memory of 432 3840 rdha.pif 105 PID 5372 wrote to memory of 2188 5372 cmd.exe 106 PID 5372 wrote to memory of 2188 5372 cmd.exe 106 PID 432 wrote to memory of 5256 432 chrome.PIF 110 PID 432 wrote to memory of 5256 432 chrome.PIF 110 PID 432 wrote to memory of 5256 432 chrome.PIF 110 PID 432 wrote to memory of 5140 432 chrome.PIF 111 PID 432 wrote to memory of 5140 432 chrome.PIF 111 PID 432 wrote to memory of 5140 432 chrome.PIF 111 PID 5256 wrote to memory of 4588 5256 cmd.exe 114 PID 5256 wrote to memory of 4588 5256 cmd.exe 114 PID 5256 wrote to memory of 4588 5256 cmd.exe 114 PID 5140 wrote to memory of 3320 5140 cmd.exe 115 PID 5140 wrote to memory of 3320 5140 cmd.exe 115 PID 5140 wrote to memory of 3320 5140 cmd.exe 115 PID 5256 wrote to memory of 1968 5256 cmd.exe 116 PID 5256 wrote to memory of 1968 5256 cmd.exe 116 PID 5256 wrote to memory of 1968 5256 cmd.exe 116 PID 5256 wrote to memory of 5196 5256 cmd.exe 117 PID 5256 wrote to memory of 5196 5256 cmd.exe 117 PID 5256 wrote to memory of 5196 5256 cmd.exe 117 PID 432 wrote to memory of 468 432 chrome.PIF 118 PID 432 wrote to memory of 468 432 chrome.PIF 118 PID 432 wrote to memory of 468 432 chrome.PIF 118 PID 432 wrote to memory of 2716 432 chrome.PIF 121 PID 432 wrote to memory of 2716 432 chrome.PIF 121 PID 432 wrote to memory of 2716 432 chrome.PIF 121 PID 432 wrote to memory of 2716 432 chrome.PIF 121 PID 5152 wrote to memory of 552 5152 Chrome.exe 132 PID 5152 wrote to memory of 552 5152 Chrome.exe 132 PID 5152 wrote to memory of 3060 5152 Chrome.exe 133 PID 5152 wrote to memory of 3060 5152 Chrome.exe 133 PID 5152 wrote to memory of 3060 5152 Chrome.exe 133 PID 5152 wrote to memory of 3060 5152 Chrome.exe 133 PID 5152 wrote to memory of 3060 5152 Chrome.exe 133 PID 5152 wrote to memory of 3060 5152 Chrome.exe 133 PID 5152 wrote to memory of 3060 5152 Chrome.exe 133 PID 5152 wrote to memory of 3060 5152 Chrome.exe 133
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\PO_0908-0989989_Royal International Construction, L.L.C.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:5372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -WindowStyle hidden -inputformat none -outputformat none -NonInteractive -Command2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\system32\extrac32.exeextrac32 /C /Y "C:\\Windows\\System32\\extrac32.exe" "C:\\Users\\Public\\Libraries\\expha.pif"2⤵PID:1272
-
-
C:\Users\Public\Libraries\expha.pifC:\\Users\\Public\\Libraries\\expha.pif /C /Y "C:\\Windows\\System32\\cmd.exe" "C:\\Users\\Public\\Libraries\\alpha.pif"2⤵
- Executes dropped EXE
PID:1452
-
-
C:\Users\Public\Libraries\expha.pifC:\\Users\\Public\\Libraries\\expha.pif /C /Y "C:\\Windows\\System32\\rundll32.exe" "C:\\Users\\Public\\Libraries\\rdha.pif"2⤵
- Executes dropped EXE
PID:5504
-
-
C:\Users\Public\Libraries\expha.pifC:\\Users\\Public\\Libraries\\expha.pif /C /Y "C:\Windows\System32\certutil.exe" "C:\\Users\\Public\\Libraries\\ghf.pif"2⤵
- Executes dropped EXE
PID:5452
-
-
C:\Users\Public\Libraries\alpha.pifC:\\Users\\Public\\Libraries\\alpha.pif /C C:\\Users\\Public\\Libraries\\ghf.pif -decodehex -f "C:\Users\Admin\AppData\Local\Temp\PO_0908-0989989_Royal International Construction, L.L.C.cmd" "C:\Users\Public\\Libraries\donex.avi" 92⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Public\Libraries\ghf.pifC:\\Users\\Public\\Libraries\\ghf.pif -decodehex -f "C:\Users\Admin\AppData\Local\Temp\PO_0908-0989989_Royal International Construction, L.L.C.cmd" "C:\Users\Public\\Libraries\donex.avi" 93⤵
- Executes dropped EXE
PID:3752
-
-
-
C:\Users\Public\Libraries\alpha.pifC:\\Users\\Public\\Libraries\\alpha.pif /C C:\\Users\\Public\\Libraries\\ghf.pif -decodehex -f "C:\Users\Public\\Libraries\donex.avi" "C:\Users\Public\\Libraries\chrome.PIF" 122⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Public\Libraries\ghf.pifC:\\Users\\Public\\Libraries\\ghf.pif -decodehex -f "C:\Users\Public\\Libraries\donex.avi" "C:\Users\Public\\Libraries\chrome.PIF" 123⤵
- Executes dropped EXE
PID:448
-
-
-
C:\Users\Public\Libraries\alpha.pifC:\\Users\\Public\\Libraries\\alpha.pif /c PING -n 4 127.0.0.12⤵
- Executes dropped EXE
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\system32\PING.EXEPING -n 4 127.0.0.13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4840
-
-
-
C:\Users\Public\Libraries\rdha.pifC:\\Users\\Public\\Libraries\\rdha.pif zipfldr.dll,RouteTheCall C:\Users\Public\\Libraries\chrome.PIF2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Public\Libraries\chrome.PIF"C:\Users\Public\Libraries\chrome.PIF"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\\ProgramData\\4882.cmd4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5256 -
C:\Windows\SysWOW64\esentutl.exeC:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o5⤵PID:4588
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Users\Public\alpha.pifC:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\\ProgramData\\4823.cmd4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5140 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 105⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3320
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\\ProgramData\\551.cmd4⤵
- System Location Discovery: System Language Discovery
PID:468
-
-
C:\Windows\SysWOW64\colorcpl.exeC:\Windows\System32\colorcpl.exe4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2716 -
C:\Program Files\Google\Chrome\Application\Chrome.exe--user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5152 -
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ff8243fdcf8,0x7ff8243fdd04,0x7ff8243fdd106⤵PID:552
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1856,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=1844 /prefetch:26⤵PID:3060
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --field-trial-handle=2204,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2200 /prefetch:36⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --field-trial-handle=2324,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2320 /prefetch:86⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3208,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3204 /prefetch:16⤵
- Uses browser remote debugging
PID:4744
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3348,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3344 /prefetch:16⤵
- Uses browser remote debugging
PID:4376
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=4408,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4420 /prefetch:86⤵PID:4064
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=4792,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4788 /prefetch:86⤵PID:4768
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4968,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4964 /prefetch:16⤵
- Uses browser remote debugging
PID:3768
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5000,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4996 /prefetch:16⤵
- Uses browser remote debugging
PID:404
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4956,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4876 /prefetch:16⤵
- Uses browser remote debugging
PID:3632
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5384,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5460 /prefetch:16⤵
- Uses browser remote debugging
PID:4036
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5536,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5552 /prefetch:16⤵
- Uses browser remote debugging
PID:5024
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3288,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3192 /prefetch:16⤵
- Uses browser remote debugging
PID:5008
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5580,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3260 /prefetch:16⤵
- Uses browser remote debugging
PID:2024
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=renderer --string-annotations --noerrdialogs --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5140,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5064 /prefetch:16⤵
- Uses browser remote debugging
PID:2580
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=5564,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5204 /prefetch:86⤵PID:5868
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=5604,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5628 /prefetch:86⤵PID:1064
-
-
C:\Program Files\Google\Chrome\Application\Chrome.exe"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --field-trial-handle=5660,i,13642089904781685928,11759343356199627122,262144 --disable-features=PaintHolding --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3212 /prefetch:86⤵PID:556
-
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\nkzvgricuyjtktqtemlysbwyfc"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\yeeohjtvigbfuzexvxgsvorporgif"5⤵
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
PID:1016
-
-
C:\Windows\SysWOW64\recover.exeC:\Windows\SysWOW64\recover.exe /stext "C:\Users\Admin\AppData\Local\Temp\ihkyicexeotkxnabehttgtdyxxqryyee"5⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe--user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"5⤵
- Uses browser remote debugging
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:1620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\TmpUserData /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\TmpUserData\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x238,0x23c,0x240,0x234,0x248,0x7ff823ccf208,0x7ff823ccf214,0x7ff823ccf2206⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=2280,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:36⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --headless --string-annotations --noerrdialogs --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2248,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2240 /prefetch:26⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=2648,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2644 /prefetch:86⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3540,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:16⤵
- Uses browser remote debugging
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --pdf-upsell-enabled --remote-debugging-port=9222 --disable-databases --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4244,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:16⤵
- Uses browser remote debugging
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=4744,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3496 /prefetch:86⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=4908,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4904 /prefetch:86⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=4408,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4452 /prefetch:86⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5536,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:86⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5536,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5540 /prefetch:86⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5664,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5660 /prefetch:86⤵PID:5756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5636,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4716 /prefetch:86⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5808,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5804 /prefetch:86⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --noerrdialogs --always-read-main-dll --field-trial-handle=5696,i,7451654679518964355,7978770251409811607,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:86⤵PID:3408
-
-
-
-
-
-
C:\Windows\system32\cmd.execmd /c exit /b 02⤵PID:2188
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:2408
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1944
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:1852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59a020804eba1ffac2928d7c795144bbf
SHA161fdc4135afdc99e106912aeafeac9c8a967becc
SHA256a86c6c7a2bf9e12c45275a5e7ebebd5e6d2ba302fe0a12600b7c9fdf283d9e63
SHA51242f6d754f1bdbeb6e4cc7aeb57ff4c4d126944f950d260a0839911e576ad16002c16122f81c1d39fa529432dca0a48c9acfbb18804ca9044425c8e424a5518be
-
Filesize
19KB
MD51df650cca01129127d30063634ab5c03
SHA1bc7172dec0b12b05f2247bd5e17751eb33474d4e
SHA256edd4094e7a82a6ff8be65d6b075e9513bd15a6b74f8032b5c10ce18f7191fa60
SHA5120bddf9ecaaedb0c30103a1fbfb644d6d4f7608bd596403307ed89b2390568c3a29e2cf55d10e2eadbfc407ede52eaf9a4f2321ba5f37e358a1039f73c7688fbd
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5e7b63aa3f322d59f64325bc39fab88c8
SHA1678b5174d1287ea781115a26088e056c0dad2857
SHA2564dde4b88b93bd549b5893cb73595e6688d3de186f7728da40580797eb1329dd4
SHA512ae78d8f976b09ff815e766576563d3f7907c0838058364bf9a65059dcedf1528bc8a6e3acbaedab2b172b34d27a4ca3e99320ebab5a04dc9b36581138dec55a0
-
Filesize
37KB
MD527f08413721fc0c8b29044c70537a1ed
SHA1da22d64f50b982d97908cd8f49b83a92ae15d5c6
SHA25662885bfb756d6e590f6bb7c03d53210e8713448e0890c96b7595233ca8e149de
SHA512409058a70196b35a1785332c6619b9f616c92ac5bd47320e8207a61469974f2ae6135674256b525819d460143828040fa7e651ca0d3743d11b0f686381b4a161
-
Filesize
1024KB
MD5b0366599d64b0fc1adb2a712dcd02ee1
SHA1b7a1c09ccd2846664cab5f76bd80b8e9f107acb0
SHA256ae1bddb9e2cc97b0c9cd78ef3cd17553be6e5204677bd67e0b8f7fa27007f189
SHA512d7de6d48285018f8b709c81ca01688126db7893ce9f48829524ee3122aa6f2200c7f78186b5a558d0b1ecf8157ee78a20064b63b45ab89f7aa0835b8409435d0
-
Filesize
40B
MD5a6af3e490e3b95afca81362f57ff9738
SHA1d1ffb359ed34307d57a650c73de50b9c82febfd1
SHA2566dfa585884a0e3c8dbbda829a158819322f0a0949a85adb90fef99928176689c
SHA5124e8b4ea5fea4ab7e360a6be705bc3b39e6bced92f073daeea5a96306c4e94e438573edad713bad4aebf475a34be5b522f0bb458a1362ed63656566d3ff9e4da1
-
Filesize
280B
MD5d16fb70f7240a039c339f6c0f746b3c6
SHA1c889cb5ae9cc1b6c750d438f2f21c1b04de86a3c
SHA2565cb9aabf643dbad9852634b7ce2179528c6880e9c9d2cd71cd959701f907d268
SHA512789cf7f4f0fca13fc33b54f88477176ad1d790dc672ea06298ca43c65a7687fb901d64d7f9afb3e981908169efcca1a8164b1e518e1c1dd8022a48901519c6fa
-
Filesize
280B
MD5e4df0ad192ac75a455897660686175aa
SHA18a3d33902c0e74c3403ea18ce73784a5d8827fc0
SHA2560c947a3f1cff1b4a802637945ff85a2058e8f244361f85eced2b746b3753709d
SHA512ac89d90c713942945903624dbb4341b31c701ed391a18eec39652951e81c57042c478f2b0d3875748e14860d6a1f21ab1ea0f5dea1b3e1d83961b1e2e2059082
-
Filesize
280B
MD5a10ec0cb6d7bb6777a9725c309328a74
SHA128b817c93a1a64edefe2ddabec2c75673562734d
SHA2565e5fb797d03dcdebf7c2848900004a305f32b18bd969e27057ea4b60a4e16b91
SHA512a46e4032ae38ef7bf3b78fb25b1da59aa71fe741a4c8d2316ba5121fd9696e6dd8900244ff735a6696c1568dee902778355caaec6235b8dd39d49d5d0fb2a95b
-
Filesize
280B
MD560cf6e7acaa721fff5a23e196df4a2e1
SHA12883a8faca487a4d70f2ebf70a2b41bf0f3e86e3
SHA256bcd46f728208a1ce7a62b4ef248a975edface200787264a085caae82c2be4e1b
SHA512546fc9d3b1eee27e6cb5543f0ed50ca16a1ff72aad255f42fc01664ff0b491b073ae2a032c678576db0652fb9533474dae5398017959f199980de65418ea072e
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
32KB
MD517f6136f6b98006c90f9a15f2abd484c
SHA1fbbde93b368d47c631eec354ee8422c0246f8b3e
SHA2563716c58ec8ccb4f6a9addef57d063a59c28b1989a510d63adf1da7394cee83a6
SHA5128841680ce6e6f7f2b3ec17799c9253854e76bafdc60c980c59eb561fdcd251d0a0a35fd2e02fdf3d25485239efaa243b2a59d51c6b87ed9f48c841dcc902c08b
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_1\_metadata\verified_contents.json
Filesize1KB
MD5738e757b92939b24cdbbd0efc2601315
SHA177058cbafa625aafbea867052136c11ad3332143
SHA256d23b2ba94ba22bbb681e6362ae5870acd8a3280fa9e7241b86a9e12982968947
SHA512dca3e12dd5a9f1802db6d11b009fce2b787e79b9f730094367c9f26d1d87af1ea072ff5b10888648fb1231dd83475cf45594bb0c9915b655ee363a3127a5ffc2
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_1\content.js
Filesize9KB
MD53d20584f7f6c8eac79e17cca4207fb79
SHA13c16dcc27ae52431c8cdd92fbaab0341524d3092
SHA2560d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643
SHA512315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
20KB
MD5a156bfab7f06800d5287d4616d6f8733
SHA18f365ec4db582dc519774dcbbfcc8001dd37b512
SHA256e87b3d155c7582d4c1d889308b58f84e8fe90a1581014b21b785d6694bd156cc
SHA5126c8eeab3ae6fb0d5be7758cca521665b216f31aed1aeeeaf121c99dc9f0192b385de0da36e94f90dd4a9bbbac6be2c5a55d2f284a24ccb7dec2c5302fb9b027c
-
Filesize
20KB
MD5ef396c4a5ca14bb616987c5a3cc2d83d
SHA131eaade41a087f0c0fe08a3a8e6e2b183a61181b
SHA256d9cb1819569b93e79aef9c05b533498d6c88563390250cd149e4ed5e813a2ae5
SHA512a017098f8d91f7050e599b37314526d44868ce8638d455088d0143fd1543e8b731058b35a582db05e9a84fae5bea696e4c9d1a6f3f9ac9a85c5d8e6ada1e07cd
-
Filesize
2KB
MD5ec8399ec6da41a41a9f589030ea82402
SHA10afc326b5ac74c13b6fc176ae623e515458eb6e6
SHA256963d61a50e9ad13a8761c7ef1dbc7a91ff1f21075bcc0b9247381a34310b1566
SHA512f53af56dfdc04bb1cf523104a6bdc8b1730674cfa3cc0ff5d98d13d1c198c35d38e0c5aa3a65b5c351966d1a6cce3fc8bc31999fb462602af1667d27757273a5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
7KB
MD5df0e6a78e00e0caaf42c372baab7adc2
SHA123b57f275c599c9c93ca7fc11808b6039ccd04f4
SHA2565ea9995b84fb24f2f63021b97382a4e710fa5c344f060261de6f947eebd6b4dd
SHA51246fe1dfb0a590f03fcc3e428ff7c534ec335a182f220c0e6669d4b5aef349cff94be67a039d96670191c12631dbd06f99326fa22599cd01218315b3db7f05b70
-
Filesize
11KB
MD55c02fab45de97e16f9ed5ec53aa2ccc9
SHA11a7959bd202d635f8c4454749682052937650970
SHA256f4a11a92cd9fe84cbae8cb2efb42b4caca984b0eee04d6048981feb95561c557
SHA512aea845d19a3cc023c1837c61dfee6a9ddda6ee284ecd6e9ed0f611f8672341def6fa11ae9f9ac230de256db21b82139ce9ac021cf58473e8882686dd1ae4b5c8
-
Filesize
32KB
MD5718735c89fd2a998619240597aa4d6e8
SHA1eacc94844496bd98007bd9c00d42d538187806c0
SHA2568dc6123f9a84e8f2a46350a76e0dbae82ecc9cb0fc9dc5042baa223c7afa0776
SHA51249ed07b94dbb00b19a485b2a1934a5487113aaf57efb4eec2dde6d39b785563441e82bbf3c7c1c6e4104b5c006c4aaac2a80c6e7ca91fd00b1e3bc1c9f8ce5d5
-
Filesize
32KB
MD5236bfc5124c5dd8716e8c5f0f5b0957c
SHA15042d929db01c565995bad00cff1c3095fbaf3eb
SHA2569b9b4f4aab97ee37deeded7cd20b08ec7b7b94e2b324474be67911fb067fd22e
SHA5122a986d23c9579b4bab6320f8afb41da5a9844c2ed537a3ca12413c7c1fec3530e4772bd4dbceb972b5ad06a2d135b64841d6fc697e6ce65bce336303110dacd4
-
Filesize
15KB
MD57d353150bf3d334b553bd419ff3dd463
SHA131061a87c40960221d3fc200d35f18e887fc8e06
SHA2564024640f0c8181adea603a24da533ec161f8ae32b263860787d121736d468117
SHA512e71fce93ced8d79708832d17025442fb9830b897321d4aa0e0cc47bbd517eeb1df9217e53eb90da2d6dc5600863eea7a08ab8d41d5e31f1c25d491f4a117d26a
-
Filesize
15KB
MD57347eedb4518da52dfc9f8f99a56f390
SHA11b7b43f35b62a2a5a855500b7dc55c22a0b323ae
SHA25674ba90e06b3bfb74662d437dcc73ff95c44a589da575716cd0170951551dcfae
SHA512a631adf611f3fd606bb94d3be5083430cd560e05b2695a17499d70d426f16ef20ee78294d23e6bf982fe1287168b5adf0e181fef1b5aeba9fb72a5e442f77400
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
291B
MD5970502e69cb513a5f5d7e1d13e71d505
SHA16127c6bacc17e183308f073f5c2c3e0093c326a4
SHA25667ea7aff4eb0d718c64c7f4deae20bb0ad4d30c11f2f8f8b9435a53935a946bf
SHA512a5bf8e4f98bf465928c1de1fc5aa1c353b6321764d3fe0851dd1834689542c9f6538dc53f63ad28569d7fd96ccec258caa2f3c4d3ef9fb84a1e57a5c27acd23c
-
Filesize
267B
MD5d34ea5ddd0a6f8a753befe69f83f6c53
SHA15473323e6ca5f351eb9f168cb791c4444d20460e
SHA2560dfe595cca5bd55fedf0a677e84e5a1a6d3f3a26ccdabb88d674abd5918e7e2b
SHA51226d979afd6ff7ff6a4c35baa78c8a89412f16f71a37f7dc825eef6e9b8e528a712569ae5cdef500fb1b349c21a3e4c1d868cdc612fea99242dfd6e3af7528fbe
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\32.png
Filesize1KB
MD560953b3aca67505c2c7ea1a902e84d51
SHA15e6a8e04a96e36306c66409edd4775a606f13f54
SHA2563197a2ac164c5bacb65f02fd9a6eb9c0a533fdf3b24f43043bbe9af65ed6608a
SHA5122e65ec84471c3f703617171aa32f1a0d6c57d73e1d5c074b92d20d580df78e7ac4eef5ce54ab7defd0027bb38e33c44a6602d3e123a2fd310e514af0f5b38086
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\48.png
Filesize2KB
MD51625c1dd7bab831d8ab5308a1a71d525
SHA1f1c145985a7c8c18891caaba0f46729bcbd1f63b
SHA2569bdfc3aa03d4e41b0d83862ce02f9fe7fdb55a492280d86d551b91a24efd47ca
SHA51275079bcb02482abd10b121d81fe39607dcac17bb3107ca274c549b570bb473260dfdbdd13df769b1745425ac5433a22fd392a2a1d815897e0c2091b787bada8e
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\64.png
Filesize2KB
MD5e6671b804d6013a6706ea598e2d854c5
SHA140e4f401fe4afbf7bda49a02fe94f5308868460e
SHA25657d5cd9fa59f944ffc78ec2a12633a79e2f923124fc50676ffbecaef5021b4a9
SHA5127b11a47497ae5810ec4c7038ebf8358f03d79126886feb6daffd92d116fd606f530ecced9c3d635c0f57b9f9eb80ed9e8fa4eb98b029f9fd798d9b89ccd279a8
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\32.png
Filesize927B
MD526496798ba29a454042d60c9633c1e72
SHA165977f9cc15dd73026c91b479f1bc678050c8c45
SHA256af50d64bd3cc7c3d201cb5abf0d76f44737e2a4040741ce178d9765fe440bcc5
SHA512a4a61f66c712fcd27681073c2f30fda3a98fb6348ac4451d8a8e181e525f4ad8491a09d19c17dfb8f01a53eecbfc3ba25f370afd9df5b2ecb9b613236ecdd3cd
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\48.png
Filesize1KB
MD5815ddced6b03c8a62cb590ea4585fcba
SHA19f7e8cce2319b15ec63d89f837a173bd247e6998
SHA2563339af4538fdfa40bb438469e35f6b7668d5c5ac93db0ef4a9e2fbf9ae884446
SHA512ec7069b51959572c40dfa02f380b081912053898b4d4f86166b90bd277f9e8271d0fb3f0627e82645052ebe021c2e24698785e5214e82190a2298f32dd879b3d
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\64.png
Filesize1KB
MD5f2222b9d8dea52f5ce7d75378de76037
SHA1e3b266fca2e5bf8bd82a62791902e879af7ff6fd
SHA256e895cbcc424d6000a15b21d7cc9dec96deb2403a1469761ba3d9f11528c215b1
SHA51274b947bc915c89f27954b5d0c8c790316ace581a20f7031aa91af3d95303ff0dd8cb4c87d3746ef2b13f76e0e8bba1b5b4a6916f3230c0514164fb1700640f66
-
C:\Users\Admin\AppData\Local\Temp\TmpUserData\Default\Web Applications\Temp\scoped_dir5152_28373125\Icons\128.png
Filesize5KB
MD56a371e7bbf132a71f031772845249b9c
SHA136f499f3a2e2bf885019d914a0cc6e8b3e035a79
SHA25699b19cf47ea4e47b933229e92b87a474fbd5af7936bdf885c2240d0e6f4bdaaa
SHA512b1fdcd5af84fa476808b8e89794d9df9f8e48b3e7c1a2239deae10832834d01bf311803ac95b3774d781be791b47389310ca866e1a6b497925ca6e2f004555a6
-
Filesize
13B
MD53e45022839c8def44fd96e24f29a9f4b
SHA1c798352b5a0860f8edfd5c1589cf6e5842c5c226
SHA25601a3e5d854762d8fdd01b235ce536fde31bf9a6be0596c295e3cea9aaf40f3dd
SHA5122888982860091421f89f3d7444cacccb1938ef70fc084d3028d8a29021e6e1d83eaef62108eace2f0d590ed41ece0e443d8b564e9c9a860fc48d766edb1dc3d9
-
Filesize
80KB
MD5f6681cbf4d9167b9479427c68096e1dc
SHA149479eabc6fc5afa843accca3062703b2b8930c2
SHA2566cccf990c51b1cbc916a4c40a814a88f0e96ef10a321d800cf991db499695a6d
SHA512fc06b423c66059ece8f815b341899acf6845805bfd246b4b1ac90e371cc6873ba8808bcf19de5be48c09d1d8bfef33b9cf8945ee76cfd8b4b5d3d2f6ac392a05
-
Filesize
151KB
MD5500967b150a29a146348845e3cc71851
SHA110dec13a0af47426d00e671c0943e86e6d36d037
SHA256e5452dafc5301871187c423891d2b78ee48f571e913f0d145eaaf8210e58d7bd
SHA5123469ccaa64f48630a52b74190ff08fbdb1320fb73eb62fe7966471ed7f854ac7a3b24424595225352acf70569a069d1c6cf92f61a7d41acfd4d4651de45a31cd
-
Filesize
47KB
MD5f29dd7063e1d7d53192aaad852cab9b4
SHA1191e5eb5ac21ae5a8b6b7118ddb8085f1f4b51bf
SHA2569af55f86d80d45cc6cc61a1071c9271979c3a2bd12836c80eaea01f1f62dcbfe
SHA512b5c9174dffec08c706673e54cc4cdf4f3ab18ae91689dd02485e2028898912e05faebe41951f97b6b20f32110007f4e84503436b2a99333477366ddea2b52fb9
-
Filesize
41KB
MD585b190533ca671bb3ac769102b21412f
SHA1ceb50c4d498c7fe28da73b8a164e8ede76b17168
SHA256ee4a295fdfb1e8d2e1e2512ddad72334ecd0170578c696a52920114d4b579bad
SHA512eeb2d3e301f3c39989150693d5434c11fa0d853f2faccb51cd921388555c8ba7e15aaa3121ca22f81e4b3f2cc4743406cbdb9290f5919f5b89dde302c230f44f
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
256KB
MD5450e9a0203e7ce54e06199a2b1ea1eb3
SHA1fd1e5fb9b6ddfa46bc4c6e257567fa6c2f50d4b9
SHA256971f191bf4b861ad8f128985ca265f6db6b7f6fee527c9dcbdbb6a9a799f859e
SHA512de78a13dc779b2d3d02c49f1c28604bc881025773249834829ae9d856dd07451ceab1ab1a93709791da947607dd09c1a23dc56a15ce78c19e32730bb6cd7a5c6
-
Filesize
85B
MD5bc6142469cd7dadf107be9ad87ea4753
SHA172a9aa05003fab742b0e4dc4c5d9eda6b9f7565c
SHA256b26da4f8c7e283aa74386da0229d66af14a37986b8ca828e054fc932f68dd557
SHA51247d1a67a16f5dc6d50556c5296e65918f0a2fcad0e8cee5795b100fe8cd89eaf5e1fd67691e8a57af3677883a5d8f104723b1901d11845b286474c8ac56f6182
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
4KB
MD505a640e15ef8a6cd5d8db4633bfd2df3
SHA123771918cb286dd2ca98c0cc1664931e64cc33c8
SHA2565b8be3e1fe8438ab1032b5914b5f5b8f544defc91213c6ef3f307b44d2a1951c
SHA51227d198ecea0bbc12a48ce27c8dbd8a9a445248956623cefd501562cf00162a662e40f020a7276f1f870f324617f419342de9384b71664eea4778866b8bcfd616
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1620_1079159115\3055e1db-2811-4fe2-83c4-eb850067d3fd.tmp
Filesize10KB
MD578e47dda17341bed7be45dccfd89ac87
SHA11afde30e46997452d11e4a2adbbf35cce7a1404f
SHA25667d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550
SHA5129574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD512b22f984df3830c7f3b3ad342045f7c
SHA1f1b1feb27bc5f2a415fa1b77ad4413409c7d14b2
SHA2568205e474c9b481376467e2baf4fadb161a89fc8c896defd19657cb0a9fd90773
SHA5125f07691bcbad8c064bb9a59f00edc0578a9336110e3a675877c9eabd2ad5f2a8359f11dc5500b25b08204c769fe514d66dac6a718a1d3bd0665a744aa983d4f6
-
Filesize
283KB
MD58a2122e8162dbef04694b9c3e0b6cdee
SHA1f1efb0fddc156e4c61c5f78a54700e4e7984d55d
SHA256b99d61d874728edc0918ca0eb10eab93d381e7367e377406e65963366c874450
SHA51299e784141193275d4364ba1b8762b07cc150ca3cb7e9aa1d4386ba1fa87e073d0500e61572f8d1b071f2faa2a51bb123e12d9d07054b59a1a2fd768ad9f24397
-
Filesize
1.6MB
MD57182e7bda4256397b944f48a904c3e4b
SHA1f4be8f94ff227b64aeb938df5fb67b7f608a0c7d
SHA2560734f514b98c5bb009e380768218aa48e9f141e511084b7608e110b44d34388a
SHA512b005c31ab285b80e7f7f6d40774a6b242dc905f235f10c090cf7fe6f702801572008315d0b3e9b99d13a5fbaf2f177886ab977d90a8118fb7318dacead92f429
-
Filesize
3.1MB
MD5f53038a3e3da7f979bc9412fee8176a1
SHA15d25ccd56a87f876eeef39912553d530d1367441
SHA25644575c2dd8a05e7d42ded8212f61ce253c76be5b23ea01e1e937b6f2c75876ff
SHA5126d0c3d0d71c291884eb58df76c9f00a704f35f6b25f5206b33f2151fa2fab75e16ef646a7d305dc8301b8df9e18342b353f4800a277c2147b7aac2199179d395
-
Filesize
34KB
MD541330d97bf17d07cd4308264f3032547
SHA10fcd5a3233316939129e6fcf4323e925e8406e5d
SHA256a224559fd6621066347a5ba8f4aeeceea8a0a7a881a71bd36de69aceb52e9df7
SHA512ae29e41c01ee6620fe822f9feb3dd851617314cec4d8ef750d2ebd2c61bd24fb54012146123f1fdf9b893f26e83ce5a17dbc5d3aae42bb04daab6d42e82f2a04
-
Filesize
1.6MB
MD5bd8d9943a9b1def98eb83e0fa48796c2
SHA170e89852f023ab7cde0173eda1208dbb580f1e4f
SHA2568de7b4eb1301d6cbe4ea2c8d13b83280453eb64e3b3c80756bbd1560d65ca4d2
SHA51295630fdddad5db60cc97ec76ee1ca02dbb00ee3de7d6957ecda8968570e067ab2a9df1cc07a3ce61161a994acbe8417c83661320b54d04609818009a82552f7b
-
Filesize
70KB
MD5ef3179d498793bf4234f708d3be28633
SHA1dd399ae46303343f9f0da189aee11c67bd868222
SHA256b53f3c0cd32d7f20849850768da6431e5f876b7bfa61db0aa0700b02873393fa
SHA51202aff154762d7e53e37754f878ce6aa3f4df5a1eb167e27f13d9762dced32bec892bfa3f3314e3c6dce5998f7d3c400d7d0314b9326eedcab72207c60b3d332e
-
Filesize
231KB
MD5d0fce3afa6aa1d58ce9fa336cc2b675b
SHA14048488de6ba4bfef9edf103755519f1f762668f
SHA2564d89fc34d5f0f9babd022271c585a9477bf41e834e46b991deaa0530fdb25e22
SHA51280e127ef81752cd50f9ea2d662dc4d3bf8db8d29680e75fa5fc406ca22cafa5c4d89ef2eac65b486413d3cdd57a2c12a1cb75f65d1e312a717d262265736d1c2