Resubmissions
12/12/2024, 07:37
241212-jf7x6sypal 1012/12/2024, 07:25
241212-h8za3avjav 1001/10/2024, 21:18
241001-z5vbda1ckm 1001/10/2024, 21:17
241001-z5g12svcjh 1001/10/2024, 21:14
241001-z3n2ks1bml 1001/10/2024, 21:12
241001-z2cxxs1arl 10Analysis
-
max time kernel
318s -
max time network
320s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2024, 07:37
General
-
Target
rundll3.exe
-
Size
5.6MB
-
MD5
be8e765b8622989c5e4aa6414c2b030c
-
SHA1
b6cb7f1ffcceff8fbe572594ffc6aa515420e0a0
-
SHA256
6fdb160c3b7a5813f187afd606ef2e24cfde0e66e3a0663ce65cd1372fdc32ab
-
SHA512
e0522301c8d2c156fe6157d7d1ca3a305078ed35bd3a2cf1131bea2a97246eaa8e00751cb4ad9c63e26d97149bdf5898da6d443d8c224735c81589462bd571ad
-
SSDEEP
49152:YfPM6fbpCpuj2TCOHIiRO06E6M5UqdJtunHnVnzm5EatXXzihWGNggHL/rF2tZVb:GpRY2IEfm
Malware Config
Signatures
-
A potential corporate email address has been identified in the URL: currency-file@1
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 66 pastebin.com 67 pastebin.com 68 pastebin.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133784629013775415" chrome.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1752 rundll3.exe 2032 rundll3.exe 3396 rundll3.exe 4728 rundll3.exe 3016 chrome.exe 3016 chrome.exe 4992 rundll3.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe 3652 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe Token: SeShutdownPrivilege 3016 chrome.exe Token: SeCreatePagefilePrivilege 3016 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe 3016 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4728 5004 cmd.exe 123 PID 5004 wrote to memory of 4728 5004 cmd.exe 123 PID 3016 wrote to memory of 244 3016 chrome.exe 125 PID 3016 wrote to memory of 244 3016 chrome.exe 125 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 4376 3016 chrome.exe 126 PID 3016 wrote to memory of 1676 3016 chrome.exe 127 PID 3016 wrote to memory of 1676 3016 chrome.exe 127 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128 PID 3016 wrote to memory of 4360 3016 chrome.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\rundll3.exe"C:\Users\Admin\AppData\Local\Temp\rundll3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\rundll3.exe"C:\Users\Admin\AppData\Local\Temp\rundll3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
C:\Users\Admin\AppData\Local\Temp\rundll3.exe"C:\Users\Admin\AppData\Local\Temp\rundll3.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\rundll3.exerundll3.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Users\Admin\AppData\Local\Temp\rundll3.exerundll3.exe -pass e7d1b16b93589f3eb5e07913fc9affafe901cbb451f670afaf6a1122698e92b82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fffa23ecc40,0x7fffa23ecc4c,0x7fffa23ecc582⤵PID:244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1948,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:4376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2092 /prefetch:32⤵PID:1676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2284,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2236 /prefetch:82⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3084,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3424,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4588,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:1692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4872,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4884 /prefetch:82⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4928,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4932 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4900,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5232,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4504 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4880,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5104,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:3220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5420,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5380 /prefetch:22⤵PID:2580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5356,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=3500,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=3268,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3808 /prefetch:12⤵PID:1176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=860,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5388,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5324,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4780,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=3520,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=5912,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:2556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=6120,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=5548,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1316 /prefetch:12⤵PID:212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6020,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6040 /prefetch:12⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=6112,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:4516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=6384,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6108 /prefetch:12⤵PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=5332,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6392 /prefetch:12⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=6420,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6536 /prefetch:12⤵PID:3012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=6820,i,9224381575306098159,10067032179122830303,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=6836 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4428
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f6b0cc0048b1b1f2a2ee65562e93fd18
SHA119f5f5d47e73421a33a6eb93290138c45a5548f9
SHA2569cb305d9c97d21ba2eeebc737095d6eecf044c66e3190144d6ca41606f508c3a
SHA512352a34047134e8291a1c6db85495d64427b6be3943569a8e9b839ede15a025eb07eabe304a6b17944c9e2d73ad1b1bf87c675e399f96f68d3cdd0120d9b3f869
-
Filesize
792B
MD53dd5652c00ef2232fece733b5171417b
SHA1916724e7c966f6fb39b88bc5839a0a0489e1ecb0
SHA2565fe3799c7c458b6b54db3eb4e17cc0e4ee50b8c1a18820d7555d27dd95b4213b
SHA512fe4791b47fe6154ee5537d4c13be26a4696405bf37aca9a08c5c54f44ec2ab50eacd7ae4a8b249ce07be3df9cbf6d89bd6b96188e037c36e2779196800f18d2a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.84.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
8KB
MD57ef1694180ea2730c6eb63dce07737ca
SHA164a73d9361b9cb11d7920044204d514dcdfd8f31
SHA256ffcd5e144fedfca0f61d80c0bf6522b05c2ea30c91e354a7e14697186c135799
SHA512936ba46c507a483e3ea557450887869304037a7aee81598f530fcc071310cd8f54af81be3f783c74dcbdb00cf4e7de77ceadc24f3b1b29451cd9431e72b62b26
-
Filesize
14KB
MD59fc14a30e39b6db5d6892c1d04f4a3d2
SHA1da4ee0300e8900cb2a6826170f40a775d59b5169
SHA2569ff41812d53294da9e1dcc0e08b95818e8a9243b133157ce7161deedd3a3edba
SHA51204f309b59fd9fb28169a64adb44dfa30f22f3ddc405e3fb5fb736e8350c2a6add3e417ded0805a97e94b46cde1fca753713993196cd756146e80c015f8396e4a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD5eca82ea70495cf53aadcc674bde77e73
SHA15086864a846bfc0ceb3b0509f4b149b01337e88f
SHA256ee40b0c3a5d328c8654220dd6a7e7e263499fe44a9833c962927f1d959dfb753
SHA5127122dd7df9a6a3dca18aa4945fcb6f1f7bf69af43dfa5dae6d63ae3853fd77e54356c66b4f462991dafd494a53b0831a7f81ae48aaa8d57c0ac41383daa12861
-
Filesize
1KB
MD538a21187fd687390b77fe1db699a34e7
SHA1052e8214ef8415bbda2d52a150e7fac39de77a18
SHA25641dbdc33ba6b25183d76c1b2078c72f044ec2ae31022559c88fbe9c238e214ec
SHA5126976c165c123752971afa74d3c700140fe42bec7e303ed9aba766910693e3a0e60388e16c4d2fb924596ad0ab116a3654d63b047ac5b3a7d52dff76c4492b871
-
Filesize
3KB
MD59e12c4ca78cc019f053e4c802ed127df
SHA15642f1db4a25d14220326ade31a22868fca62093
SHA256656ea6ba2b5e98b4368bdd33e32ee7f28733ac5de6ba3082840b91ec10b1deba
SHA5123febb889e418187ca836e48e48568bab5ed4e13bf32e512eca4f533b37a05be85b159c733c30f1282e9f1ae31c1aa15429c8032efe1b2403ec44025b41f70eec
-
Filesize
3KB
MD5e9b08e7ac88b7f1557e5f930359691c1
SHA14099954256abe13ee01e316c8d9d6f98128180af
SHA256720c4cb18857b02cb2b6fa5e3e7b7ed77909a216303d83ac5b9e46802cdc0d85
SHA512fded8babc4c6dc9c02b590aa4571c19d3ff2fe08c95a48fc814bab25962de6970560fb1a441c1579b35898beb1b6b3eae8fcadb7720b2a941d9e9ed9ba068606
-
Filesize
3KB
MD5c3180b2257e857037805cb50582cde6f
SHA1ef8aee51c08e5bb727fa0a1273b416740cd8693d
SHA25659ddbb7062299084f30d171f66da252924b90d689da8af595d4d14db960f4e3b
SHA512b0feaaffe0b2f300db7650ecd3b30cae5d4f257d3576db08a0631433a01d527f5de5d7009a46b3d482d2c0b3a171128bfde6971f6f658dabacf5ddbf8516dc4e
-
Filesize
2KB
MD59ec4572827a52134130f89554a985e61
SHA144c65c22307fbbdd99b0c4bc237ef65b712e29be
SHA2568e91f894a7c5270f0684dcebe4f767c112161f7900330c25d1de093ad55cb11b
SHA51248deb6a49439f0deec770c6c792f704d6b5ce15786482e1de3c82fb1bd8ca0283bc44110ac30ad31278a59a382ebc97839d0131d4ab3f31307f412138d9c4eac
-
Filesize
356B
MD5e46908b29327d0255b629a40a1b8216c
SHA1f3d2b10dc4dae4ce70e5cf21a5420e582d5a7c22
SHA256e5adcd746205b2d4e1848fa29dd68c2580cef9849add4f14cd1ab8d4568473ac
SHA512e5aa02fcbbfbda8284b2f0569568a83af577ac64b06b235958dcc2dbf401bba77814940adbd43bd992c4343c9a3f371a8f16af4d00c31f217be369578f8630ca
-
Filesize
9KB
MD59dc67912a25d0573610572787f9e9173
SHA1ac8966485e82343bc2c0850a64a6ef72ebc0bdc4
SHA256bef73fb857b1c229815b1525353bc3d5e8818bd71444abd2ddfe7fc2fe733114
SHA512395a0950501a2436ffa037e8848f83b84e033503ea835dcaf3e8bc6a1f7537274111bf5ae79501dc3a7c3312d2c377e6b1c513580c9e8d05d8cd0c3b5339013e
-
Filesize
9KB
MD5a7c02a12d5914d5bdff6d58d54471e9f
SHA12e6c6047218e5b3101ad24305aa28765dfa9c8ca
SHA25637dd060fc72eacc5e799d2561ccc943d9b22636b25cba58f9c59728458e2847b
SHA5124856ccf72b1765efe9c0333d4a5d11efe505f06b2daef37a8cc2d04704e7c37346d02d8aff249525ffea2d84eea5d5bf839a2aa723b2118e8de5b746e9e718d7
-
Filesize
9KB
MD56a57d181333c43bf70594611922e264a
SHA15d1748079e5680530358fe2907aee0fa29ca2dca
SHA2565e12306d47df15b185d68cc07a03f15a5ef17fc13bb24524aaea7f56b9e011e9
SHA5129acd3e3e729b2ff4f8cb98a89a2c38256a2973159387c897a4b5f4989d1474e41f3682ebbe085cf9325fa7b46ef9d2fe8158f880a0d4f8c139c8297725fc313d
-
Filesize
9KB
MD51a417f1fbcb79d2c0cbcabefadcdd079
SHA15be31c5a4c5e909bc81605f65a12fa57106e1f0d
SHA256502716ce7223826f932e6c417d36ca62c4bc4ec11af551ce530a2f2cfea47856
SHA5128620965b6c61a728aae94a84893db6ffc33f9ffefe6e8317dce579fea10c708fc5b2ae033e83f86738bee0d8a9d9e3c66ced1f76f75e7bad447b2be16472bff5
-
Filesize
9KB
MD5268ba4e4270d3d1ebb0cb6b46bd93673
SHA1586d2e9bcf5c088d6c4c83490ef7c3f0d6fba400
SHA2560774f8e79f844f4d7bc8dabdf3a68a137cc88db44a60d761428dacafb9584891
SHA5123268a53a255a6f8a3040c8dd609d227df84ead3b71a1196ef539c5f83c1fbf3ea578387ac9615b6962b7a985970aabdc369156298cea58b1e49d544df749771f
-
Filesize
9KB
MD50b4e7cd97f452bbba5a14160f6e988b2
SHA13a01884de89c4b2f94a99bcb8dd86517aa6a9586
SHA256e703532b68871888442a35c5e45de1d7dd94f85b5667d75fc515e80d84660ca3
SHA512d1d7e52864ae97387eae47912890f845bae3bbf93e6244196515071a87e1cc25093fca1cedd1981970426d1308b7d58cc24ba01793758c51f77466b02892e596
-
Filesize
9KB
MD5494dfe56871dcb5a41c9687fc3ce6cc1
SHA1fcc8582aaf16baf26da7b5c0b71d31ac6f1a6c32
SHA256522f531b8e3422c4d8b2e081ba618470f0e8f37b8a70f35808c80465f397f7e6
SHA51222995dca2e8e14aff18e943578ec2bf75c5ab4182d3304c9916f2295465ad5e6a4f4acb87da116659c879def3881a96541f73bfbd0c07ada9fc007b4782c0055
-
Filesize
9KB
MD592dc81affc87b71944624e1c4895afad
SHA1917b5b5d88361d163b34b083991483b5810e79d1
SHA25661f07b39dde79374269914473727ea7a3bb4053728a9dbba66e9aadec4fecc6f
SHA512c057d1aee42c69e4a9d84780f6b781517cbdc675b900ea0a6e64ce1d688ad331d2fd4b9d524adbd731572a1448eb042bae893f95d5fd47ac035a1d28296c2386
-
Filesize
9KB
MD56661ac32b93bff3e6b3eb11332f604e6
SHA13d7c47997530409566da78154f382e922585f779
SHA256dde97de71c03e74d70b18ac4d4fac7bb03b819c7e9f3746f5b98b8cf45331b59
SHA5121a6f72047da1e658bd01f64d50a40233735314b42756a24092c5664c8373962fafb966468e5f40635d6850123268cd6db184a0b6957bc4d553b2f72ad8f99619
-
Filesize
9KB
MD55f8dbbdc7d462f81e2af3adbd28c14e2
SHA188d103b0dcebcd2a274194df2a6395cd910e5b64
SHA2568edbf2eedbf9e8fa648fcb7ac963b4804999d3527f45416ca0e24152155e3f40
SHA512bb5ec54f8edf8fbc67a0f178ae21649810e00acbae9d2a397b25a01256790b9f14f6e04514d5ac6d5f3ec4d1a8efe23d92efaddd8018888c9a02b3da0240c209
-
Filesize
9KB
MD5ebb5d33f5607606351e71c72435c50c9
SHA161eb1169f3154ba60076e13712521909eebd3fc5
SHA256268f3aca8d8d73f951c2ba20f62c89a86d76cd050db85b8419b7019971b4ce9c
SHA512edd12405cd4ad610cca4c21b06a0e1ad590af900752d82daf328f2d1810bfa5eadc0dcae5e552ba10860a4098d9924b6cc656e8cf9bf74b8e7cb1209d0466feb
-
Filesize
9KB
MD5304563a7032041a748c12d293dec6701
SHA1272b8be4f9c5bd9750f9060cb766cdce47bf79f4
SHA256b8915721a17ee63c0393b6116341163e5c4f1b0eef1c0a9c7fd985ea4cb3e61d
SHA51237af6a4f66a8c95daf20226974b8147bf94ffb72b937eb04d4ba26ea77b27aa32d5be03a08222780ff53cc05be7a131ba2859ad957f34ca28a402c22d6c227aa
-
Filesize
9KB
MD5b888a609bbdbcba28587eef0136d8d23
SHA102e8a53c414cb7086cd6a300d7ae8153ab2525a8
SHA256b2ac2a32838bf1e8e30eec75b29ea9f99b22c0f49657ea5ccd90793bb97fa7cd
SHA5121f5744b1a76b41a2695a3eb7cbaf82d57c8d44ed5fd187da6dc267b59c03db5dc65424f21f720345540d662e25035cd6cfe0700899de21f369b4cb3ba079837f
-
Filesize
15KB
MD539d7151d0009a70530b3ef364e01f934
SHA114510a688c9aa9e07e6cb52d31eb8556c9d6275a
SHA2567156e6aa069684debd52ce6fccb79cb5224bdd8d0c2e6d7b0b5c9547352b29fc
SHA512c8764d79c92f0946781036f87f5e8d6f2f14dd6a622be3e3c8258b12e667755a1363df744d2c4623d312928d4f73b86bde155e26afe27892e5d64abd39e44613
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c3e7fb68d680a7583d523a93b7486324
SHA1dce34d61a3208be3d8e1a5ed8a1d7cd587171b5c
SHA2562badb2dd73fc5e216ea148839a9431d36cba996800268b887b52ad00f68fd2ec
SHA5122795bcb6ee1820a68cee358006174550d0536573448b9edaf4cb68f33e27150265d1d21df6aa31329f4d66278219323e00b7fa1f46b38c5b2b9db5d4bfeffd7f
-
Filesize
230KB
MD5d19a5dcd6621b5daab06990b63d6b9a7
SHA1f250bcb46cffee125b5624e2936326ca295e032e
SHA2560dd1c366e8ad30735730952da6bc2ab3c4bed4bde25ba5be9ae689c9f1087645
SHA512ed3b1b0e8e449b9b39f6c75a1972abc7617d828999cc58fe35ae79dbcf869f60d1b711f1c3a8f487db303a8ca5853a7f073817a6f40254846d1ac0905083dea4
-
Filesize
230KB
MD5681d1de96d8b997569ab352b52887e9e
SHA1e5850aa03949ced73182989599eae39a0678b20f
SHA2562d6beb5da020592469f2571ca5db6e92c61e5b7b5284ce82281adaa20257f85c
SHA5128e955ee1f0b29345e87ebf95527b691717a2af4721d020a8a5c8102fc2984edef6d84f25c4c091e36b51ad0cb1c5f7054d3f902db0d3344dd892cbffdb3e0e14
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
135KB
MD53f6f93c3dccd4a91c4eb25c7f6feb1c1
SHA19b73f46adfa1f4464929b408407e73d4535c6827
SHA25619f05352cb4c6e231c1c000b6c8b7e9edcc1e8082caf46fff16b239d32aa7c9e
SHA512d488fa67e3a29d0147e9eaf2eabc74d9a255f8470cf79a4aea60e3b3b5e48a3fcbc4fc3e9ce58dff8d7d0caa8ae749295f221e1fe1ba5d20deb2d97544a12ba4