Analysis
-
max time kernel
600s -
max time network
485s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-04-2024 09:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://gofile.io/d/JvD7Gt
Resource
win11-20240412-en
General
-
Target
https://gofile.io/d/JvD7Gt
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
easyvic-crackver.exeeasyvic-crackver.exepid process 4512 easyvic-crackver.exe 3424 easyvic-crackver.exe -
Loads dropped DLL 52 IoCs
Processes:
easyvic-crackver.exepid process 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe 3424 easyvic-crackver.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ipinfo.io 15 ipinfo.io -
Detects Pyinstaller 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\Downloads\Unconfirmed 8465.crdownload pyinstaller -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133584238761448560" chrome.exe -
NTFS ADS 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\easyvic-crackver.exe:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
chrome.exechrome.exepid process 4728 chrome.exe 4728 chrome.exe 1836 chrome.exe 1836 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
Processes:
chrome.exepid process 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe Token: SeShutdownPrivilege 4728 chrome.exe Token: SeCreatePagefilePrivilege 4728 chrome.exe -
Suspicious use of FindShellTrayWindow 39 IoCs
Processes:
chrome.exepid process 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe 4728 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 4728 wrote to memory of 3452 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 3452 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2280 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2296 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 2296 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe PID 4728 wrote to memory of 1316 4728 chrome.exe chrome.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://gofile.io/d/JvD7Gt1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcaceaab58,0x7ffcaceaab68,0x7ffcaceaab782⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1080 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:22⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1780 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2044 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2940 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2944 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4068 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4260 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4392 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=4424 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:12⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4472 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4820 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4868 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
- NTFS ADS
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5132 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4992 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:82⤵
-
C:\Users\Admin\Downloads\easyvic-crackver.exe"C:\Users\Admin\Downloads\easyvic-crackver.exe"2⤵
- Executes dropped EXE
-
C:\Users\Admin\Downloads\easyvic-crackver.exe"C:\Users\Admin\Downloads\easyvic-crackver.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 --field-trial-handle=1880,i,4521913082672542275,16768483004530632742,131072 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
288B
MD5a206b532b976af14b0780fcc964336d9
SHA1fedf54c77736cd3228cd8bfe7945a97b6f9ce244
SHA2564047dacdef9813fcd8b859041c8395cfe489c1eb910afd9183cabd094370c211
SHA5120766c287c11a0f208f918079846289858266b558e1789dc393156d690d520d2f37ae3ec6392c1d433981225b467531645f70c25c9f9f509ff700733fa0d5c456
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent StateFilesize
2KB
MD5a54cbdcd25e4f5231f2ab675967273f4
SHA1919f9f773a6317be9cdac032969a12c2998cc7ef
SHA256ebd4d1642f6943dbb17a2b71e430fae4ecf4c6e9d30e261d7fc47afbfdcad090
SHA51214845b46c01f4792543b665cb757077b03f017d9b5d33b12993538b6136a8ea5fa9a0650fed681dc96a546bdd88bc8897ed93337ee3d380cea07fc3b8de22c9d
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending ReportsFilesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurityFilesize
688B
MD5993f436a48c78459862bcacd9761fb9f
SHA1a1b217d711ebcfdd762173f84e341c4ed6acaa33
SHA2564b2fb74f2c501c8cd04f5248084e620c86cb50899571c0de4b451c3ee63db528
SHA512a1c8d0c3617d3916533014a23816317d64ef101c3ff13e662b1a1f350215782b3fc2d2fc29ee5845a456f8be10a0b28efecbd8e674ea6441dbc615b0ed1c28b8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5a72b783d28178509121905497bf086f6
SHA1b0773c474a8013b1ccd39350997c52e6c2be4ad1
SHA25662aeb44684b418d544f23e7e87dfb35db251b3fda9a34f2072ba6febcebf2819
SHA512c73d4ca1ee1aeae5210cad896837085e5f39b6f57c8618e1bbf0d0c6b5f39be30539269b568c28f769f4a4a4656751ec4814c191e7b0e79a7fe3beede8ba7829
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD5ef0f0a287161f0a6fce872a1a0e6eca7
SHA17c459fd65ae8f089e0e15846361012eba0960107
SHA256f503abf12b5f903a7a3560fa6ab497915ef66e86bfae684ab8500cb1abd80034
SHA512250463cc688839fcc727643ab381c0327ab79e46880ede0bb506b4168cc61e0a45e762954905ac65d53a58d73bb87162ead05d97755eccfe31b81ca44d89abe7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\PreferencesFilesize
7KB
MD59e7222236f53db55e74129a2d3580b35
SHA19d1c853bc67fc7e6aba66621e6e8da733c42d0c7
SHA25612b4d62e260dc4572c61fb162ab8b6cc589a79e3597219ee3b222ed2ae3a0c5e
SHA5126755f6a42d0500c10e87ebed1530aae566d081183a868a6e4bfa5e4914d360fdf9385ad8a7a724346021cf692b0ca7b33e7682733be16dfb6bab54b91ae71984
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local StateFilesize
127KB
MD5a6981d1330d304f6abadc0a46f25b8d3
SHA19cc61ec203688f6caded082f49db40796deab50b
SHA25629a4f59fa7f275a0c8c85b2aa8fb8b124de18d9877213d0b37d59117839652d4
SHA5120a86aca52701027cbea3e7e84eac5accf8141d092cdb4221a9d01b0ef212d6b256a30423ffc080f0339c379fa24595fa86f033f302783e064ff104591d7cf406
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info CacheFilesize
98KB
MD59dfb7f22ad5b5b027dc993522dae5b6e
SHA1393fe32f08313d4e088d9d5305610bf2aa4db49b
SHA256b4010af6cccbe40defc0c623fbde2d118e4846c6594e4a88398aa7750d8c5769
SHA51261b8b8e1348524c30ee4195f6715b6ec897de59e1a49b22ac0531d327978daba8a27be0a4cbb87a4377249448dc081ddcea8123db39de908d58d85a77bec29b0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Module Info Cache~RFe57d7f1.TMPFilesize
83KB
MD5b799860be1afe584c8a53500ad5f05b0
SHA1ca774219015e8451929bc91e6684c5f37d483ab5
SHA2564a89c1a2bdf4a9881305da34872f551b3a6b884665e020e7d197c9aa00b183bb
SHA51280f4b5b8c4f145532efae60f0158cfae6fba2a29c93bb1579b3ace16619b9b5dfd35f81fe5b4772cb9cd7bc36602dde2fda19429c9ad968c10cb4e09bd259bb8
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\Crypto\Cipher\_raw_cbc.pydFilesize
12KB
MD5ff2c1c4a7ae46c12eb3963f508dad30f
SHA14d759c143f78a4fe1576238587230acdf68d9c8c
SHA25673cf4155df136db24c2240e8db0c76bedcbb721e910558512d6008adaf7eed50
SHA512453ef9eed028ae172d4b76b25279ad56f59291be19eb918de40db703ec31cddf60dce2e40003dfd1ea20ec37e03df9ef049f0a004486cc23db8c5a6b6a860e7b
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\Crypto\Cipher\_raw_cfb.pydFilesize
13KB
MD5fe489576d8950611c13e6cd1d682bc3d
SHA12411d99230ef47d9e2e10e97bdea9c08a74f19af
SHA256bb79a502eca26d3418b49a47050fb4015fdb24bee97ce56cdd070d0fceb96ccd
SHA5120f605a1331624d3e99cfdc04b60948308e834aa784c5b7169986eefbce4791faa148325c1f1a09624c1a1340e0e8cf82647780ffe7b3e201fdc2b60bcfd05e09
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\Crypto\Cipher\_raw_ctr.pydFilesize
14KB
MD5a33ac93007ab673cb2780074d30f03bd
SHA1b79fcf833634e6802a92359d38fbdcf6d49d42b0
SHA2564452cf380a07919b87f39bc60768bcc4187b6910b24869dbd066f2149e04de47
SHA5125d8bdca2432cdc5a76a3115af938cc76cf1f376b070a7fd1bcbf58a7848d4f56604c5c14036012027c33cc45f71d5430b5abbfbb2d4adaf5c115ddbd1603ab86
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\Crypto\Cipher\_raw_ecb.pydFilesize
10KB
MD5821aaa9a74b4ccb1f75bd38b13b76566
SHA1907c8ee16f3a0c6e44df120460a7c675eb36f1dd
SHA256614b4f9a02d0191c3994205ac2c58571c0af9b71853be47fcf3cb3f9bc1d7f54
SHA5129d2ef8f1a2d3a7374ff0cdb38d4a93b06d1db4219bae06d57a075ee3dff5f7d6f890084dd51a972ac7572008f73fde7f5152ce5844d1a19569e5a9a439c4532b
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\Crypto\Cipher\_raw_ofb.pydFilesize
12KB
MD5619fb21dbeaf66bf7d1b61f6eb94b8c5
SHA17dd87080b4ed0cba070bb039d1bdeb0a07769047
SHA256a2afe994f8f2e847951e40485299e88718235fbefb17fccca7ace54cc6444c46
SHA512ee3dbd00d6529fcfcd623227973ea248ac93f9095430b9dc4e3257b6dc002b614d7ce4f3daab3e02ef675502afdbe28862c14e30632e3c715c434440615c4dd4
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\Crypto\Util\_strxor.pydFilesize
10KB
MD53af448b8a7ef86d459d86f88a983eaec
SHA1d852be273fea71d955ea6b6ed7e73fc192fb5491
SHA256bf3a209eda07338762b8b58c74965e75f1f0c03d3f389b0103cc2bf13acfe69a
SHA512be8c0a9b1f14d73e1adf50368293eff04ad34bda71dbf0b776ffd45b6ba58a2fa66089bb23728a5077ab630e68bf4d08af2712c1d3fb7d79733eb06f2d0f6dbf
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\VCRUNTIME140.dllFilesize
99KB
MD58697c106593e93c11adc34faa483c4a0
SHA1cd080c51a97aa288ce6394d6c029c06ccb783790
SHA256ff43e813785ee948a937b642b03050bb4b1c6a5e23049646b891a66f65d4c833
SHA512724bbed7ce6f7506e5d0b43399fb3861dda6457a2ad2fafe734f8921c9a4393b480cdd8a435dbdbd188b90236cb98583d5d005e24fa80b5a0622a6322e6f3987
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\_bz2.pydFilesize
83KB
MD56c7565c1efffe44cb0616f5b34faa628
SHA188dd24807da6b6918945201c74467ca75e155b99
SHA256fe63361f6c439c6aa26fd795af3fd805ff5b60b3b14f9b8c60c50a8f3449060a
SHA512822445c52bb71c884461230bb163ec5dee0ad2c46d42d01cf012447f2c158865653f86a933b52afdf583043b3bf8ba7011cc782f14197220d0325e409aa16e22
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\_ctypes.pydFilesize
122KB
MD529da9b022c16da461392795951ce32d9
SHA10e514a8f88395b50e797d481cbbed2b4ae490c19
SHA2563b4012343ef7a266db0b077bbb239833779192840d1e2c43dfcbc48ffd4c5372
SHA5125c7d83823f1922734625cf69a481928a5c47b6a3bceb7f24c9197175665b2e06bd1cfd745c55d1c5fe1572f2d8da2a1dcc1c1f5de0903477bb927aca22ecb26a
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\_hashlib.pydFilesize
63KB
MD5f377a418addeeb02f223f45f6f168fe6
SHA15d8d42dec5d08111e020614600bbf45091c06c0b
SHA2569551431425e9680660c6baf7b67a262040fd2efceb241e4c9430560c3c1fafac
SHA5126f60bfac34ed55ff5d6ae10c6ec5511906c983e0650e5d47dac7b8a97a2e0739266cae009449cced8dff59037e2dbfc92065fbbdfde2636d13679e1629650280
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\_lzma.pydFilesize
157KB
MD5b5355dd319fb3c122bb7bf4598ad7570
SHA1d7688576eceadc584388a179eed3155716c26ef5
SHA256b9bc7f1d8aa8498cb8b5dc75bb0dbb6e721b48953a3f295870938b27267fb5f5
SHA5120e228aa84b37b4ba587f6d498cef85aa1ffec470a5c683101a23d13955a8110e1c0c614d3e74fb0aa2a181b852bceeec0461546d0de8bcbd3c58cf9dc0fb26f5
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\_queue.pydFilesize
27KB
MD54ab2ceb88276eba7e41628387eacb41e
SHA158f7963ba11e1d3942414ef6dab3300a33c8a2bd
SHA256d82ab111224c54bab3eefdcfeb3ba406d74d2884518c5a2e9174e5c6101bd839
SHA512b0d131e356ce35e603acf0168e540c89f600ba2ab2099ccf212e0b295c609702ac4a7b0a7dbc79f46eda50e7ea2cf09917832345dd8562d916d118aba2fa3888
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\_socket.pydFilesize
77KB
MD5f5dd9c5922a362321978c197d3713046
SHA14fbc2d3e15f8bb21ecc1bf492f451475204426cd
SHA2564494992665305fc9401ed327398ee40064fe26342fe44df11d89d2ac1cc6f626
SHA512ce818113bb87c6e38fa85156548c6f207aaab01db311a6d8c63c6d900d607d7beff73e64d717f08388ece4b88bf8b95b71911109082cf4b0c0a9b0663b9a8e99
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\_ssl.pydFilesize
149KB
MD5ef4755195cc9b2ff134ea61acde20637
SHA1d5ba42c97488da1910cf3f83a52f7971385642c2
SHA2568a86957b3496c8b679fcf22c287006108bfe0bb0aaffea17121c761a0744b470
SHA51263ad2601fb629e74cf60d980cec292b6e8349615996651b7c7f68991cdae5f89b28c11adb77720d7dbbd7700e55fdd5330a84b4a146386cf0c0418a8d61a8a71
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\base_library.zipFilesize
1006KB
MD51679f462d89f5ff916060bb0fd9c5e92
SHA1008ce2975775066745119190b22e8ea8ccc766c7
SHA2561dfee206c92ba4127173056fb1657aec9b8fe0da01a942fcd82491e6fc91aedf
SHA51256f9431cfdfb4adf8c2547c2e8bd1e870cf6d2643eff8dbb5fa6bf2914d60ec492716bc9a11d1359e45280c6e2ee6ac28f4ce6e5ecb1b7cd7708c0a7efa51017
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\charset_normalizer\md.cp39-win_amd64.pydFilesize
10KB
MD5c4de5638d7cf59a01c768448c6bef89d
SHA14405bae0d6fc5502e32689d99e74abafd87f9588
SHA256cd8f4e8f69c855042a8f36f68a1601d96f09568baff51f96decda4fa5aeb274d
SHA512adbf18508988af7c081539110d1b2b2f3acdea0e63bd039ec94fc57b53464761abae1639ad21f6302465ddf8fed3b0f987d9300d457be2706f10b2a36d58bce9
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\charset_normalizer\md__mypyc.cp39-win_amd64.pydFilesize
111KB
MD5d67200e140f7226beda03e3fac5dbfce
SHA1d09d0d558ca640d380ec463ef0c6acaaf800f12c
SHA256ae2bdf86ce87b46bd557f7955ae4d018155e9bead7ccb63c65f359ae79fc5309
SHA512d8fb745b85db89978b4abfa1ebd645bf837ed9bdec80ab647f31de0fc0a547112a893e3f76912445a367d289e57a080da25797ef8ead7cd18e1b3f6e4aaf8350
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\libcrypto-1_1.dllFilesize
3.2MB
MD5cc4cbf715966cdcad95a1e6c95592b3d
SHA1d5873fea9c084bcc753d1c93b2d0716257bea7c3
SHA256594303e2ce6a4a02439054c84592791bf4ab0b7c12e9bbdb4b040e27251521f1
SHA5123b5af9fbbc915d172648c2b0b513b5d2151f940ccf54c23148cd303e6660395f180981b148202bef76f5209acc53b8953b1cb067546f90389a6aa300c1fbe477
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\libffi-7.dllFilesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\libssl-1_1.dllFilesize
673KB
MD5bc778f33480148efa5d62b2ec85aaa7d
SHA1b1ec87cbd8bc4398c6ebb26549961c8aab53d855
SHA2569d4cf1c03629f92662fc8d7e3f1094a7fc93cb41634994464b853df8036af843
SHA51280c1dd9d0179e6cc5f33eb62d05576a350af78b5170bfdf2ecda16f1d8c3c2d0e991a5534a113361ae62079fb165fff2344efd1b43031f1a7bfda696552ee173
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\python39.dllFilesize
4.3MB
MD511c051f93c922d6b6b4829772f27a5be
SHA142fbdf3403a4bc3d46d348ca37a9f835e073d440
SHA2560eabf135bb9492e561bbbc5602a933623c9e461aceaf6eb1ceced635e363cd5c
SHA5121cdec23486cffcb91098a8b2c3f1262d6703946acf52aa2fe701964fb228d1411d9b6683bd54527860e10affc0e3d3de92a6ecf2c6c8465e9c8b9a7304e2a4a6
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\select.pydFilesize
26KB
MD57a442bbcc4b7aa02c762321f39487ba9
SHA10fcb5bbdd0c3d3c5943e557cc2a5b43e20655b83
SHA2561dd7bba480e65802657c31e6d20b1346d11bca2192575b45eb9760a4feb468ad
SHA5123433c46c7603ae0a73aa9a863b2aecd810f8c0cc6c2cd96c71ef6bde64c275e0fceb4ea138e46a5c9bf72f66dcdea3e9551cf2103188a1e98a92d8140879b34c
-
C:\Users\Admin\AppData\Local\Temp\_MEI45122\unicodedata.pydFilesize
1.1MB
MD58320c54418d77eba5d4553a5d6ec27f9
SHA1e5123cf166229aebb076b469459856a56fb16d7f
SHA2567e719ba47919b668acc62008079c586133966ed8b39fec18e312a773cb89edae
SHA512b9e6cdcb37d26ff9c573381bda30fa4cf1730361025cd502b67288c55744962bdd0a99790cedd4a48feef3139e3903265ab112ec545cb1154eaa2a91201f6b34
-
C:\Users\Admin\Downloads\Unconfirmed 8465.crdownloadFilesize
10.0MB
MD591ff872384255be6c3d64c321d84f5dc
SHA1a893cd0bda1fe7c022599a76e16514edc4183f71
SHA256fc1f1b401e14aa82b2eda2845ea2dd2ce360d949839888a584822a10e03dc657
SHA51248401c9da4e7770125cc3c492708b824aa0bf1edfe372456964e6d5243c215068641f4253e637c2691cae7aba2a8cec44d524723d014db0806aaafafb15459a7
-
C:\Users\Admin\Downloads\cooper\downloads.txtFilesize
72B
MD541b48e03335c5a59b9a8f9e51968d658
SHA137db61c96e4b4f637a871a18bea457a0f62539f6
SHA256ffcce5c134c83a76af1e4db5562f1d0a4beb10623de86a803cf32a2df6ff1f30
SHA512b0131a0ddf57678514626c0e72986a993e808abb1048cade9da48229cfd49aa7f253f09935215e6ee4539a60add96b71e1a4b7674eead9a6ccfb71581b2eaeed
-
C:\Users\Admin\Downloads\cooper\web_history.txtFilesize
86B
MD545f33de7adeaf9a33f3c006940b9e6e2
SHA1439dd656e2b97e2ec07f04ade119848f74cb3f6d
SHA25663e746173396aaefbf1b7ed723033f24030529bfa9e05922d3325e55510a74ea
SHA5128f4256db83b3e41464317c310f2e01de020e3b9784dfd4cbf9bee010b85f7b7437c2ca1f4b6f7106e2b207c764259d67f5828da6191b14bf817444310101c8d9
-
C:\Users\Admin\Downloads\downloads_dbFilesize
116KB
MD54e2922249bf476fb3067795f2fa5e794
SHA1d2db6b2759d9e650ae031eb62247d457ccaa57d2
SHA256c2c17166e7468877d1e80822f8a5f35a7700ac0b68f3b369a1f4154ae4f811e1
SHA5128e5e12daf11f9f6e73fb30f563c8f2a64bbc7bb9deffe4969e23081ec1c4073cdf6c74e8dbcc65a271142083ad8312ec7d59505c90e718a5228d369f4240e1da
-
C:\Users\Admin\Downloads\downloads_dbFilesize
152KB
MD5f935acc80cadba8db70aafa99fbb57b0
SHA1e2f9a1db6c501caa14e162ceff333506d0fb7217
SHA256a4213389bd587dcb9c309f6b2fd40194d63bbb49a35c87e01ea428344a2d616c
SHA512fa2a8bf6d7b60c6b24b10d5fe5b11b111c9a263353642741fa4e63190937935fb97fa295d9a81fa371c825827c960cdce3f04ff7a24538d582fb9710a2258eb4
-
C:\Users\Admin\Downloads\easyvic-crackver.exe:Zone.IdentifierFilesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
\??\pipe\crashpad_4728_OJYVGSDTFFSPNKCRMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/3424-276-0x000001FF12850000-0x000001FF129C2000-memory.dmpFilesize
1.4MB