Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 02:40
Behavioral task
behavioral1
Sample
d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe
Resource
win7-20241010-en
General
-
Target
d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe
-
Size
9.1MB
-
MD5
5f5a59388cb0c21980392e79117aa430
-
SHA1
b8ce8db28d2298af9595e9431d4ecd86c57fffc1
-
SHA256
d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679d
-
SHA512
211a5d0dfbbdbd3c1e5461d2a1e2a83e0e26ec95df506b5f058eca66f1c2f43d82e0c3363be77883c05e3a6606e7a40e14aeb75ce342e4c187f0724d3ea657d4
-
SSDEEP
196608:qMgt5LKUjY+A1QtCopK7ogW5o35+VqmXaEvNTWc3KFKxJS+9:VA5WUs+A1OCopRX5y54qmXaEvNTx3KFU
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Detect Neshta payload 7 IoCs
resource yara_rule behavioral2/files/0x0006000000020231-220.dat family_neshta behavioral2/files/0x0007000000023cbc-278.dat family_neshta behavioral2/memory/3572-397-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3572-407-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3572-438-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3572-464-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3572-467-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Xred family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\IsInstalled = "1" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Version = "43,0,0,0" setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components setup.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96} setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\ = "Google Chrome" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\StubPath = "\"C:\\Program Files\\Google\\Chrome\\Application\\131.0.6778.205\\Installer\\chrmstp.exe\" --configure-user-settings --verbose-logging --system-level --channel=stable" setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96}\Localized Name = "Google Chrome" setup.exe -
resource behavioral2/files/0x0002000000022f44-387.dat -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 34 IoCs
pid Process 2608 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 3608 ._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 4844 updater.exe 456 Synaptics.exe 876 updater.exe 5048 updater.exe 4872 updater.exe 4808 ._cache_Synaptics.exe 4764 updater.exe 3412 updater.exe 4792 updater.exe 2204 updater.exe 4472 131.0.6778.205_chrome_installer.exe 3720 setup.exe 1588 setup.exe 1844 setup.exe 2452 setup.exe 4904 chrome.exe 3328 chrome.exe 3348 chrome.exe 4316 chrome.exe 5080 chrome.exe 4856 elevation_service.exe 4724 chrome.exe 1688 chrome.exe 3892 chrome.exe 3508 chrome.exe 1848 chrome.exe 5404 chrome.exe 5580 chrome.exe 5984 chrome.exe 5360 chrome.exe 5636 updater.exe 5648 updater.exe -
Loads dropped DLL 33 IoCs
pid Process 4904 chrome.exe 3328 chrome.exe 4904 chrome.exe 3348 chrome.exe 4316 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 4316 chrome.exe 5080 chrome.exe 5080 chrome.exe 3348 chrome.exe 3348 chrome.exe 3348 chrome.exe 1688 chrome.exe 1688 chrome.exe 3892 chrome.exe 4724 chrome.exe 4724 chrome.exe 3892 chrome.exe 3508 chrome.exe 3508 chrome.exe 1848 chrome.exe 1848 chrome.exe 5404 chrome.exe 5404 chrome.exe 5580 chrome.exe 5580 chrome.exe 5984 chrome.exe 5984 chrome.exe 5360 chrome.exe 5360 chrome.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer chrome.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\Google Chrome.lnk setup.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\ru.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\optimization_guide_internal.dll setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\ko\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\iw\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\nn\messages.json chrome.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\sk.pak setup.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\0fbdc555-eb0a-4e32-b9f4-9230d49668ea.tmp updater.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\nl\messages.json chrome.exe File created C:\Program Files (x86)\Google3608_219322208\bin\uninstall.cmd ._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\da.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\pt-BR.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\zh-TW.pak setup.exe File created C:\Program Files (x86)\Google\GoogleUpdater\prefs.json~RFe58a023.TMP updater.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\updater.log updater.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File created C:\Program Files (x86)\Google4808_1614662096\UPDATER.PACKED.7Z ._cache_Synaptics.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\et.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\VisualElements\SmallLogoBeta.png setup.exe File created C:\Program Files (x86)\Google\GoogleUpdater\prefs.json~RFe58ef7c.TMP updater.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\af.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\bn.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\kn.pak setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\cs\messages.json chrome.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\updater.log updater.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\ne\messages.json chrome.exe File created C:\Program Files (x86)\Google4808_787845745\updater.7z ._cache_Synaptics.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\prefs.json updater.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\sw.pak setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\ja\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\en_CA\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\hy\messages.json chrome.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\prefs.json updater.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\lt.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\chrome_pwa_launcher.exe setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\elevation_service.exe setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\pa\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\eu\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\bn\messages.json chrome.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\it.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\pt-PT.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\sv.pak setup.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\v8_context_snapshot.bin setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\no\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\fr_CA\messages.json chrome.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\prefs.json updater.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\resources.pak setup.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\prefs.json updater.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\am\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\fi\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\hu\messages.json chrome.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\hi\messages.json chrome.exe File opened for modification C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad\settings.dat updater.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\ur.pak setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_locales\zu\messages.json chrome.exe File created C:\Program Files\Google\Chrome\Temp\source3720_121976662\Chrome-bin\131.0.6778.205\Locales\mr.pak setup.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping4904_2000359927\_metadata\verified_contents.json chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4472 131.0.6778.205_chrome_installer.exe 3720 setup.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133791360804788922" chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Google\Chrome setup.exe Key created \REGISTRY\USER\.DEFAULT\Software setup.exe Key created \REGISTRY\USER\.DEFAULT\Software\Google setup.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Google\Chrome\InstallerPinned = "0" setup.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\ProxyStubClsid32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{C4622B28-A747-44C7-96AF-319BE5C3B261}\1.0\ = "GoogleUpdater TypeLib for IAppBundleWebSystem" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{B685B009-DBC4-4F24-9542-A162C3793E77} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\ChromePDF\shell setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{521FDB42-7130-4806-822A-FC5163FAD983}\LocalService = "GoogleUpdaterService127.0.6490.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\TypeLib\ = "{F258BE54-7C5F-44A0-AAE0-730620A31D23}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{5F793925-C903-4E92-9AE3-77CA5EAB1716} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{ACAB122B-29C0-56A9-8145-AFA2F82A547C}\TypeLib updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B685B009-DBC4-4F24-9542-A162C3793E77}\1.0\ = "GoogleUpdater TypeLib for IPolicyStatusSystem" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{D106AB5F-A70E-400E-A21B-96208C1D8DBB}\ProxyStubClsid32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{18D0F672-18B4-48E6-AD36-6E6BF01DBBC4}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{8018F647-BF07-55BB-82BE-A2D7049F7CE4}\ServiceParameters = "--com-service" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\TypeLib\Version = "1.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\TypeLib\ = "{85AE4AE3-8530-516B-8BE4-A456BF2637D3}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\.svg\OpenWithProgids setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1588C1A8-27D9-563E-9641-8D20767FB258}\TypeLib\ = "{1588C1A8-27D9-563E-9641-8D20767FB258}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\ProxyStubClsid32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{6430040A-5EBD-4E63-A56F-C71D5990F827} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1588C1A8-27D9-563E-9641-8D20767FB258}\1.0\ = "GoogleUpdater TypeLib for IUpdateStateSystem" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\1.0 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChromePDF\Application\ApplicationIcon = "C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe,0" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{699F07AD-304C-5F71-A2DA-ABD765965B54}\1.0\0\win32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\TypeLib\ = "{DD42475D-6D46-496A-924E-BD5630B4CBBA}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\.svg setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{7AA668AD-44C9-562C-B3B0-104376A71AFE}\ServiceParameters = "--com-service" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{F966A529-43C6-4710-8FF4-0B456324C8F4}\TypeLib updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{27634814-8E41-4C35-8577-980134A96544}\1.0\0\win64\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{463ABECF-410D-407F-8AF5-0DF35A005CC8}\1.0\0\win32\ = "C:\\Program Files\\Google\\Chrome\\Application\\131.0.6778.205\\elevation_service.exe" setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{DF978A78-4301-5160-9D81-9DA6EED2B58F} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\1.0\0\win64\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{6430040A-5EBD-4E63-A56F-C71D5990F827}\1.0\0\win32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{27634814-8E41-4C35-8577-980134A96544}\ProxyStubClsid32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{5F793925-C903-4E92-9AE3-77CA5EAB1716}\ProxyStubClsid32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A}\1.0\0\win64\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{F4334319-8210-469B-8262-DD03623FEB5B}\ProxyStubClsid32 updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{7AA668AD-44C9-562C-B3B0-104376A71AFE}\LocalService = "GoogleUpdaterInternalService127.0.6490.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}\TypeLib\ = "{1F1289FD-DD10-4579-81F6-1C59AAF2E1A9}" updater.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\GoogleUpdate.Update3WebMachine updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{1588C1A8-27D9-563E-9641-8D20767FB258}\1.0\0 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{B16B5A0E-3B72-5223-8DF0-9117CD64DE77}\TypeLib updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD42475D-6D46-496A-924E-BD5630B4CBBA}\1.0\0\win64\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\6" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{B7FD5390-D593-5A8B-9AE2-23CE39822FD4}\ProxyStubClsid32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{D576ED7F-31DA-4EE1-98CE-1F882FB3047A} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{F63F6F8B-ACD5-413C-A44B-0409136D26CB}\TypeLib\Version = "1.0" updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{B4168B26-4DAC-5948-8F80-84C2235AD469}\1.0\0\win32\ = "C:\\Program Files (x86)\\Google\\GoogleUpdater\\127.0.6490.0\\updater.exe\\5" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{B685B009-DBC4-4F24-9542-A162C3793E77} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{DD42475D-6D46-496A-924E-BD5630B4CBBA} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{F258BE54-7C5F-44A0-AAE0-730620A31D23}\1.0\0\win32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{128C2DA6-2BC0-44C0-B3F6-4EC22E647964}\TypeLib updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\1.0\0\win32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\ProxyStubClsid32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{27634814-8E41-4C35-8577-980134A96544}\TypeLib updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{463ABECF-410D-407F-8AF5-0DF35A005CC8}\ProxyStubClsid32 setup.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{85AE4AE3-8530-516B-8BE4-A456BF2637D3}\1.0\0 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\TypeLib\{513BC7DA-6B8D-45F7-90A0-2E9F66CEF962} updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{8476CE12-AE1F-4198-805C-BA0F9B783F57} updater.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0CD01D1E-4A1C-489D-93B9-9B6672877C57}\TypeLib\ = "{0CD01D1E-4A1C-489D-93B9-9B6672877C57}" updater.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\Interface\{494B20CF-282E-4BDD-9F5D-B70CB09D351E}\ProxyStubClsid32 updater.exe Key created \REGISTRY\MACHINE\Software\Classes\.webp setup.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID updater.exe Key created \REGISTRY\MACHINE\Software\Classes\Interface\{0486745C-8D9B-5377-A54C-A61FFAA0BBE4} updater.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1916 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4844 updater.exe 4844 updater.exe 4844 updater.exe 4844 updater.exe 4844 updater.exe 4844 updater.exe 5048 updater.exe 5048 updater.exe 5048 updater.exe 5048 updater.exe 5048 updater.exe 5048 updater.exe 3412 updater.exe 3412 updater.exe 3412 updater.exe 3412 updater.exe 4764 updater.exe 4764 updater.exe 4764 updater.exe 4764 updater.exe 3412 updater.exe 3412 updater.exe 3412 updater.exe 3412 updater.exe 4844 updater.exe 4844 updater.exe 4904 chrome.exe 4904 chrome.exe 5636 updater.exe 5636 updater.exe 5636 updater.exe 5636 updater.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 3608 ._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe Token: SeIncBasePriorityPrivilege 3608 ._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe Token: 33 4808 ._cache_Synaptics.exe Token: SeIncBasePriorityPrivilege 4808 ._cache_Synaptics.exe Token: 33 4472 131.0.6778.205_chrome_installer.exe Token: SeIncBasePriorityPrivilege 4472 131.0.6778.205_chrome_installer.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1916 EXCEL.EXE 1916 EXCEL.EXE 1916 EXCEL.EXE 1916 EXCEL.EXE 1916 EXCEL.EXE 1916 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3572 wrote to memory of 2608 3572 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 83 PID 3572 wrote to memory of 2608 3572 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 83 PID 3572 wrote to memory of 2608 3572 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 83 PID 2608 wrote to memory of 3608 2608 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 84 PID 2608 wrote to memory of 3608 2608 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 84 PID 2608 wrote to memory of 3608 2608 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 84 PID 3608 wrote to memory of 4844 3608 ._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 85 PID 3608 wrote to memory of 4844 3608 ._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 85 PID 3608 wrote to memory of 4844 3608 ._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 85 PID 2608 wrote to memory of 456 2608 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 86 PID 2608 wrote to memory of 456 2608 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 86 PID 2608 wrote to memory of 456 2608 d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe 86 PID 4844 wrote to memory of 876 4844 updater.exe 87 PID 4844 wrote to memory of 876 4844 updater.exe 87 PID 4844 wrote to memory of 876 4844 updater.exe 87 PID 5048 wrote to memory of 4872 5048 updater.exe 89 PID 5048 wrote to memory of 4872 5048 updater.exe 89 PID 5048 wrote to memory of 4872 5048 updater.exe 89 PID 456 wrote to memory of 4808 456 Synaptics.exe 90 PID 456 wrote to memory of 4808 456 Synaptics.exe 90 PID 456 wrote to memory of 4808 456 Synaptics.exe 90 PID 4808 wrote to memory of 4764 4808 ._cache_Synaptics.exe 92 PID 4808 wrote to memory of 4764 4808 ._cache_Synaptics.exe 92 PID 4808 wrote to memory of 4764 4808 ._cache_Synaptics.exe 92 PID 4764 wrote to memory of 4792 4764 updater.exe 94 PID 4764 wrote to memory of 4792 4764 updater.exe 94 PID 4764 wrote to memory of 4792 4764 updater.exe 94 PID 3412 wrote to memory of 2204 3412 updater.exe 95 PID 3412 wrote to memory of 2204 3412 updater.exe 95 PID 3412 wrote to memory of 2204 3412 updater.exe 95 PID 3412 wrote to memory of 4472 3412 updater.exe 109 PID 3412 wrote to memory of 4472 3412 updater.exe 109 PID 4472 wrote to memory of 3720 4472 131.0.6778.205_chrome_installer.exe 110 PID 4472 wrote to memory of 3720 4472 131.0.6778.205_chrome_installer.exe 110 PID 3720 wrote to memory of 1588 3720 setup.exe 111 PID 3720 wrote to memory of 1588 3720 setup.exe 111 PID 3720 wrote to memory of 1844 3720 setup.exe 115 PID 3720 wrote to memory of 1844 3720 setup.exe 115 PID 1844 wrote to memory of 2452 1844 setup.exe 116 PID 1844 wrote to memory of 2452 1844 setup.exe 116 PID 4844 wrote to memory of 4904 4844 updater.exe 118 PID 4844 wrote to memory of 4904 4844 updater.exe 118 PID 4904 wrote to memory of 3328 4904 chrome.exe 119 PID 4904 wrote to memory of 3328 4904 chrome.exe 119 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120 PID 4904 wrote to memory of 3348 4904 chrome.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe"C:\Users\Admin\AppData\Local\Temp\d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe"C:\Users\Admin\AppData\Local\Temp\._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Program Files (x86)\Google3608_219322208\bin\updater.exe"C:\Program Files (x86)\Google3608_219322208\bin\updater.exe" --install=appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={306A2551-5C76-061E-13BE-C75D6E8DCEA3}&lang=en&browser=3&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-statsdef_1&installdataindex=empty --enable-logging --vmodule=*/components/winhttp/*=1,*/components/update_client/*=2,*/chrome/updater/*=24⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files (x86)\Google3608_219322208\bin\updater.exe"C:\Program Files (x86)\Google3608_219322208\bin\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=127.0.6490.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x102758c,0x1027598,0x10275a45⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --from-installer5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks system information in the registry
- Drops file in Program Files directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.205 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe4cf8fd08,0x7ffe4cf8fd14,0x7ffe4cf8fd206⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations=is-enterprise-managed=no --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1956,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=1952 /prefetch:26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations=is-enterprise-managed=no --field-trial-handle=2228,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=2232 /prefetch:36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations=is-enterprise-managed=no --field-trial-handle=2396,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=2548 /prefetch:86⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3268,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=3320 /prefetch:16⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:4724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3276,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:16⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3876,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=4212 /prefetch:26⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4696,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=4720 /prefetch:16⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=4856,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=4892 /prefetch:16⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5584,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=5576 /prefetch:86⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5616,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=5576 /prefetch:86⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations=is-enterprise-managed=no --field-trial-handle=5756,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=5608 /prefetch:86⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations=is-enterprise-managed=no --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5836,i,16450992701081728431,2627537545838729688,262144 --variations-seed-version --mojo-platform-channel-handle=5892 /prefetch:26⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:5360
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Google4808_787845745\bin\updater.exe"C:\Program Files (x86)\Google4808_787845745\bin\updater.exe" --install=appguid={8A69D345-D564-463C-AFF1-A69D9E530F96}&iid={306A2551-5C76-061E-13BE-C75D6E8DCEA3}&lang=en&browser=3&usagestats=1&appname=Google%20Chrome&needsadmin=prefers&ap=x64-statsdef_1&installdataindex=empty --enable-logging --vmodule=*/components/winhttp/*=1,*/components/update_client/*=2,*/chrome/updater/*=2 InjUpdate5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files (x86)\Google4808_787845745\bin\updater.exe"C:\Program Files (x86)\Google4808_787845745\bin\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=127.0.6490.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0xe6758c,0xe67598,0xe675a46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4792
-
-
-
-
-
-
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --system --windows-service --service=update-internal1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=127.0.6490.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x258,0x284,0x66758c,0x667598,0x6675a42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4872
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1916
-
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --system --windows-service --service=update1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=127.0.6490.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x66758c,0x667598,0x6675a42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\131.0.6778.205_chrome_installer.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\131.0.6778.205_chrome_installer.exe" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\85d9adf3-255f-45dd-b7bb-c41d719a1740.tmp"2⤵
- Executes dropped EXE
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\CR_AC347.tmp\setup.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\CR_AC347.tmp\setup.exe" --install-archive="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\CR_AC347.tmp\CHROME.PACKED.7Z" --verbose-logging --do-not-launch-chrome --channel=stable --installerdata="C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\85d9adf3-255f-45dd-b7bb-c41d719a1740.tmp"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in Program Files directory
- System Network Configuration Discovery: Internet Connection Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\CR_AC347.tmp\setup.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\CR_AC347.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.205 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff60638fd28,0x7ff60638fd34,0x7ff60638fd404⤵
- Executes dropped EXE
PID:1588
-
-
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\CR_AC347.tmp\setup.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\CR_AC347.tmp\setup.exe" --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\CR_AC347.tmp\setup.exe"C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\CR_AC347.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=131.0.6778.205 --initial-client-data=0x270,0x274,0x278,0x24c,0x27c,0x7ff60638fd28,0x7ff60638fd34,0x7ff60638fd405⤵
- Executes dropped EXE
PID:2452
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\131.0.6778.205\elevation_service.exe"C:\Program Files\Google\Chrome\Application\131.0.6778.205\elevation_service.exe"1⤵
- Executes dropped EXE
PID:4856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5484
-
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --system --windows-service --service=update1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5636 -
C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe"C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\127.0.6490.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=127.0.6490.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x278,0x27c,0x280,0x254,0x284,0x66758c,0x667598,0x6675a42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5648
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD53b73078a714bf61d1c19ebc3afc0e454
SHA19abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA51275959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4
-
Filesize
4.6MB
MD5cb67d086f32edf5180b214f04bcea915
SHA19551e4dfe3b736736ab6df1ac779077d94412a0a
SHA256b14b92a0ce5085fe67195c3c95a2ff4bab958990a6849bfb8f031f717061ead5
SHA512fcc9df2da5f0e2661c297e00307be7e5b7bc94095c468d1773c2cd11c131a5a7b83d5913233baedd5019ee09683e2c2d9d3bc17f65afceccf043c86ecd98c618
-
Filesize
4.6MB
MD5675c9a53a09d5385bbdb3a43a88f2493
SHA171d1c311eadd4d5949c0b48def8ad0f2186bc243
SHA256ebb428a4c1e29192617e7699513ec78512735110bba68bbee54dee34807094ae
SHA512e3b1d8351b6d208678673e4c69aea745de5b2576a43d2cf9e06c1ea0780dcbc2ca56d5d5fc712b80309ba7950b90130ca2780185b71c990ea6c6062bd29f5136
-
Filesize
4.6MB
MD5624f3ddd404ce8894d7fce8534604998
SHA1a2e37cec7993e12bb49aebad3fb2604f96c4141f
SHA256396ebc46e357b3385facbb5bad90faa1f9dda990024199a73bc51357f29615c3
SHA512ba7157de912e22b747873ad87e1088dedccf78a8de5d0e6e163c7f374ba74c8759b901169649d48167917ecacfab41370badfd95ed5759836aeb8a766b6de748
-
Filesize
40B
MD5f61bcfc25057806a136c4a40ad39388d
SHA1cb719ffd5cc535421bc748921f171d21d5cd223a
SHA256aac982e61a4851c5500a5d2839faf09ec973fcc3e3d5c93ad58b66faf95de474
SHA51240a4c99a82bb0360fd996ff47be637dd773bcfe7ffdec30b91d44dc9bbfedceec2ce7bc9bd0fc41d2521aac3fe41fd37cf0b9fddd869c68ea1107a9e9f4e3bd5
-
Filesize
520B
MD5b6079a8ea6f6581c8835ee910f8bcf54
SHA14b3a640030a73920dbefa866dd2e4ce3e472830d
SHA256a61649e1b2100300fd1ec5a32145bc8b0c196f6cb6ed25357ed930ca558e98b2
SHA51247646a0d71d160869959424caa3c9b6a8b83528eff715b1d13a3edeec5bceb07ce7f3bb4f6679c656f470f870cf3e9566bd7e67c6afd6c9ae4b56faa8dde6db4
-
Filesize
354B
MD50b2e343e2430bf61737fa193b1c1f6f8
SHA18491ea6b5871011f5d448b832e8b7cfb7074a4db
SHA2562da3281bc72d56ca830abc560e881f49771c0ce56e30d703f10e714f782f35a4
SHA5127b94c1585d68690b1317597d61b0ad8021673d11e95bd708b539fac386c9f5868e9638697417d24cc8f6058930023f612f7468ce955256c1cb1ab78e50de8322
-
Filesize
620B
MD52adcbe382355909bcf730735bb8e8e23
SHA1404b8314671b47f6b13db40d665aa18781dc3add
SHA2564c4e74da447f113ff9022ad36609828387b2526e030aa0c1846d8f620099c85f
SHA512ab646c5f77deaa410918e85b89b0aa3f78104d630ef36e3b362fc2e59c2fc4a60ca5a16002de7985cc7bb820a71bf770d6d2e747eb0e67ca3722bdebd92216ae
-
Filesize
620B
MD5c44f90c6004af1b0603ecefa98595a52
SHA1865a91ffe116454fcbe946d93c5355cdee41b818
SHA2567419d402cdceea3a3bf6aa9717c47681c4c5e2cd5bc795a6f4d4024cde8b4b35
SHA51212d29db30c061c6fc709107ff912509e150b69f4ba141908245fc147800a082ded16623ba18fba481a741db9a3fb0ec6341cdab4fee8bb263e747ea36c60f29d
-
Filesize
49B
MD5bdce395b453a0a3ffcf742feb2a210ae
SHA18bfc909ac17238d49d93a3668256b92766391452
SHA25682f7226a5b6be7356507c368ca2468c5d9b7d4a4036fa18d85c6a99e2f0eae41
SHA512cf4d12cecd6d749990265779d1f9ec5e505b54cf283580f611cd346aaca17816b4c58547bb61c451190c07b651d967f2d03c13b74e2210195514f8087b92288e
-
Filesize
2KB
MD5304acf992271fce40a516efeff086070
SHA18bb688e908aaf0d23dc52822ce6638efd5d93fbe
SHA256467b1ec839f4c3a6c8cbce3c6b1a3e694c215d406f3e2d27a988188ceee72147
SHA512f00cb7ae01ff342177125a8d89cb0e310f03681c837cc2b499b0aee1b06bafefbecfdff0d20ddc152b25320de71ac57b976b57cca4d235ef7042a7f4c8ae004d
-
Filesize
4KB
MD5544f27e766f47d42db00a7ec8edc059e
SHA191a29c408aa77d274e1b89ef7fef4a072c33e03e
SHA256d040b6e75eda1914387f160d0db39d3db406687d8d6058ef28e703b152e92c29
SHA512c026f7010cd65ed06370c37e201643d9e3249685e0e2730bb5ace3894a63d11952bc23d75e13c807c75efffa433705ee33d8167dbd7472b5794bf198b19059dd
-
Filesize
7KB
MD5b729a5bed4d98a3c58b187a03166674c
SHA176addd1b59fd10e783537092da75d5620a798b4a
SHA256e600325d796ae54257cba492c94a4b0d695763a070e2a89a154df7754124e2fc
SHA5126de877de867dd9d82a68b2eadca1986d51db11f4d87135e504b0291284a8b3482934cc057b2ecbd190fccd67a9123560891e94de245756bc04fb530479287620
-
Filesize
10KB
MD539a4797c78032b3dd8763462552a91de
SHA14cc61e4825cdaa45a50efa306a87fa5d5d588367
SHA25639adf33a45496b5b75b712ac21dda2602e9cc0ecc913fce588f6487006b7a535
SHA512babba6866f391f5d41c112b6836b82f7eadd2226ddf93f6b47d3fbd6fa803107991f95cf8f1cbb9e8506ff388a40eae624e51f167809f422dbae013971ddaf2c
-
Filesize
11KB
MD59b019439ceba8661101630b9ad357d66
SHA14b758e6ef967fc5dc0135dd03d7eca890f548a2f
SHA25618e310a1f66594180d3c35cdb878cb91a0b77f3ab9e79c65a4706c653babfb6a
SHA512e9c42ccb606eef239be6fffa3247b9f6802a7efdbc502da53209865ed851265f02927246d1dbe3805596a426627c9b3e3af139ab60ae199ea9e67b62a9628221
-
Filesize
17KB
MD5c3965213f981a6180b285e73dee01f9a
SHA1028f4d89ec9e687b014100533d099045beb5e6ee
SHA256dbf41f5ac435ab22ce8530fed7d1123639e9ca7978980bc15dc883527928cd1e
SHA5124db656089c31e64ea4eb4d94bc97118f470329015902759bdca86e1a690f88043953cdbe48c0cdb60af4a755890c33f672147238958a8a8681ff0393bfbbf4c0
-
C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping3412_745750138\85d9adf3-255f-45dd-b7bb-c41d719a1740.tmp
Filesize677KB
MD5370be19268b400b1e4b995b38983f2aa
SHA15c367ab073034420b5e0c72a476388b12dcdb1e4
SHA25620c997cf740924ff3822f8683669aa9db5c5403193800731a21db427b8125f3a
SHA512eef5e9715ddaf62861271e338e05188f81d80e67adc8f906cdc727ac18a15b758ea311697bef8308d52083743b342669ceda6e1fdf7368d65ac815800a21a4f8
-
Filesize
5.7MB
MD58d9c429e34fc2b32683951d765f39498
SHA121f9ac058c2532eba95bb59c6fb9628115290d12
SHA256b4e1af45853fba90f9c771026c4c6a4a259b031db9578837f038bac4d9f742f5
SHA51256e222d88583a0b49a8db3c587aa8fb173f94bec8845e2cc27c8b7119cedad2d5949c2867efd9745220514052fe398d211d1a87059b99015fd0ae574f7c806d1
-
Filesize
40B
MD5443abc095112c2595ba5b700f3855314
SHA1170fc62f786300c4872a5aa4edb59ed7c9cf8e9c
SHA2565047f6beb4793c819dbfdd947d9efea87a9a9a6194d7478e06c09f575c3c29e3
SHA512824b022ae43e22976f6ad30dfbaaae8b30194373fbd1822b42c13851b936596fc214750a9bdc2bc8c1832816b7a74cf2c87bc74c2b5b3ea09e2717e8f905d78a
-
Filesize
1.3MB
MD51e1ccdc54a18883d8b5636b926bea460
SHA1357f5565cabde33d01e0c4823fbd1a6dddf336a9
SHA256916621105a28075d943f01f398efc103d3c8c39105351a7167849d54979f967b
SHA512a2f576cb3927058a1520af52d70ed0641d5a287995767961b66bac508f1e572c342a5e9b5955a93f0674ca37b6378624736bc56a3cbdbb11fcc7691e0949b79c
-
Filesize
4.7MB
MD5a7b7470c347f84365ffe1b2072b4f95c
SHA157a96f6fb326ba65b7f7016242132b3f9464c7a3
SHA256af7b99be1b8770c0e4d18e43b04e81d11bdeb667fa6b07ade7a88f4c5676bf9a
SHA51283391a219631f750499fd9642d59ec80fb377c378997b302d10762e83325551bb97c1086b181fff0521b1ca933e518eab71a44a3578a23691f215ebb1dce463d
-
Filesize
492KB
MD5fc58bc469596787bc15c888e49572ab1
SHA17d0438bd9e326ab0e1ceacb1128fd9ba56a20825
SHA256857de98fd8d9b7ac763991d83f74b1db5fc852b4675f937138ac76cd706be354
SHA512c0b1f0eeddc21ef59f74c8053cade3b932d0005eb8dcbb4e6389643b3780a907637d7dab5bf191dbac47eb685d1b3353bda039f56d76e28ccfce6e9ed2ebe801
-
Filesize
7.9MB
MD59d07f315711af0eb14cabb7fdb9dbda5
SHA1b27a04ae7af4c40050b0698f026688622c06e0b8
SHA256fa1a45639cbeeb0deccc199dfa3e6f0555a12e51d1de279d3d88752e45eb2bd7
SHA512a1f5de79f8b5b9437ed286147f63225a3a2de419fabe8c400a2ba1593a5829570833652dc0278b161da48271f3daa82041a946c12b774d00a83fff25da39f82a
-
Filesize
2.9MB
MD54b1ae6693b37358cd40de589336f2b7c
SHA13ab06699329f7e3fcae4ad197528e2cb161fa044
SHA2560b5c935f2c5d2afed1401a3cad9eb1bd74bf56577272882dd7eb2575464e0794
SHA512c2794b75b9b4c274ad0b8a8568dd981a85dec397e2dfb302f476b87161d27bed16f6e6939a6c4476e36138967dc00434b0a2081668497d24e3e245fe547e880d
-
Filesize
21KB
MD5fa24c889cded273f88c63728413b0b58
SHA1f549d186dfeb8f4994ac2848a10fa8a38fb4509c
SHA2561014dac5f201a191f60a8784a0f5b377a601c8a9b972ca54d0a7f2324ce84870
SHA5125ef8c6261ed42ffdfe11992b46e70b2e6cd40631878ae1298b423d1e39ba9755b6a865a05f3ae33f7e5480484614d823cca26b3360f7f0c70acb373358cda9e4
-
Filesize
2KB
MD59db21b604385c826430b62871413addb
SHA1e42f9f0a46e946509b21b35b3bdec4445851b0ad
SHA2563f715a2b8eea07508eac816fff2c754ffdadf8029b2a102936720871670c2cae
SHA5129c20f848e2f7274af1992c2317ca2a267d2a6c6b16c6d1c8196994f0799a5b319e8d0b7ea3e4b9f2e9ae6f857dad53e55ee47ad3efca88dd8e6f60d12d6c2e47
-
Filesize
414B
MD5de40f64e587654e61796f85d0d0a1eb0
SHA16b08366f277c363f8cc4a61934a477f0acd55195
SHA256273f098b0d1a722cf424f56939f156e2af78812236b12a7057f057d4db8f83eb
SHA512317ebad2e840e02a51a2580c1d4271e919d7f5ebcefd9e27238c841c7396b801a4d899c5ff46800f2d13b2c77b99a2b84dea75e5cf415cbf44f2ee131f250500
-
Filesize
96B
MD5295c6111f8a7e2e6a74bd0ed91d79bfa
SHA1d8c472ae0454819ff0f292b15ef4a702f98d037f
SHA256dfa2ef186f4ac7617839022935d97f12a358fd669d02576bfa0da511333a41bb
SHA512358906e1472cd4a4f63e6459ecd1609b47dbb84cc8a6a077c9be1ff4262cc863f6b492cea029fdc915cd82807a614515acee50b6d3068e74f1ba427d2b6e07d3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
192KB
MD5505a174e740b3c0e7065c45a78b5cf42
SHA138911944f14a8b5717245c8e6bd1d48e58c7df12
SHA256024ae694ba44ccd2e0914c5e8ee140e6cc7d25b3428d6380102ba09254b0857d
SHA5127891e12c5ec14b16979f94da0c27ac4629bae45e31d9d1f58be300c4b2bbaee6c77585e534be531367f16826ecbaf8ec70fc13a02beaf36473c448248e4eb911
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD57a79006450936f12ff5c702b6354cd12
SHA12e37f2c740de51b91073e42ef61d30035ea4c5a9
SHA25693364fe1721104c43bd9c98b096b636bc8c6c37af513869d3e0c8dc692898f5f
SHA51243deb632178011c605948de0af7668745900001cc1df4f7f0cfe87d306bba202e6d1a1c6b702be456160d4299947f74585a7dbb47f6b6584b6841003e6a7fb9d
-
Filesize
11KB
MD5b2a5a0def1f1b1bf05cf8195a68801fa
SHA11d72d7f61521ca1a5ff00b9a1769a004684b5368
SHA2560e6dc4b49106d4702b408e9c0df8fedda891303a0d90ee3147f3d7d60945cbc8
SHA512fe68a9dd43a8834957088c7e71d2e8fe8dc3a207b17088d6d79255ebf581ccc637a0b6f49bd9c4c704629a92249b3d4799e538865adf2f024bd629a187ca4781
-
Filesize
15KB
MD5ba1c418ffe161380e82255fc4fcd3b27
SHA18dfcdf92a8691aa86c5e94142d7b120f7dbd2d5b
SHA2562e8d6e8ef5eca983652f19c7146e822b84c98e8e2eabcb665c8aedc55e81327a
SHA512dc393607499dd5619f918920995d1f07e12b3a1f982b8a3db44bad027b81545cbf00246d4521eb7f204c8bec5fd4ca72f077be4f86700b175e9ec4b5d21f0dc5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5438288307dac80885c099cd1efd71e7c
SHA1f6a9eedfa72ea536b12b2b35ae36cab485bbcb02
SHA25643a3e7d034f0713d34f4e1e364100117a8b69a0302fa33e6e4ebfa0c3c5154fa
SHA512dd4cefc020104d56ed266afa10d2362c14a3878e353d8f50910126313a54d11eb70b81479eb8bff66bc2d587ab5c9396a3945945aaa7b4bb23b0d007cd72eda8
-
Filesize
38B
MD53433ccf3e03fc35b634cd0627833b0ad
SHA1789a43382e88905d6eb739ada3a8ba8c479ede02
SHA256f7d5893372edaa08377cb270a99842a9c758b447b7b57c52a7b1158c0c202e6d
SHA51221a29f0ef89fec310701dcad191ea4ab670edc0fc161496f7542f707b5b9ce619eb8b709a52073052b0f705d657e03a45be7560c80909e92ae7d5939ce688e9c
-
Filesize
116KB
MD5a3c40177e8f2f49b09c4c2cd5fedc8c6
SHA1134088b2b95efcc97eeea1fbb5623a0135eb2ed8
SHA25642c05cad3aa7ed144d8f294ddc815161970c277be7676ae88addceec28457a51
SHA5122087f049b448fc37ce630a173957caef531fcf2bb1668086160f0c39f5f453fdeab47169797e7458a0ca6e2d57f173a92ee2b0392c45a374c671fae969861edd
-
Filesize
195KB
MD5bb4929c1200ad66e1220f628121d4e07
SHA14d7278839d85ec3bdeb0e9a48a9c09023afcdf48
SHA256fc5df13f434dd1643e682fae95bdfc00204af8aa843c72363b5c58a49489564e
SHA5128f24df326d3fd16e000db89073d5bd337093057069f7154c1aa5e68758e6a63d168af07994070367b1595daeecb38f62eccff5be4fed068a9f0597ccf6bef5d2
-
Filesize
115KB
MD50a2b48bd4e693e969499b0d47655e189
SHA108f55bf840ebfe4fb7ae303fdf546445095386b2
SHA25662012f594e69b6449ed1a6372b02915a4f8375426ba5e9d67bc7013d0f3d9f22
SHA512533fe9cb5883aca7edd07def60683a914868d9c0ef1aef6a0882228930ad7d8e7662e03d60cf65d68494b5f6628d4a4231cf874f29fc7a2ab37886f9638aedb4
-
Filesize
195KB
MD54e28f9a72e9ffbaa7d86dfe3353d7524
SHA1ef702e37bdca761097f39e272fc6ea3b07037825
SHA2567b7aa8814dae3f11d07190f16e281d42f4d5352192e0da0db52042a9582f0214
SHA512a625a2c8f575c45fdaf6e736655ebf3d6941963a631fd78a6ca29b739eb959d79c30bba460039c125621625d9feca6aa3d88aae570a5f7b254950e8a1d33448a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.71006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
C:\Users\Admin\AppData\Local\Temp\._cache_d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe
Filesize8.3MB
MD52ef284da79aa4fb1bf7a6aa7adda9521
SHA159a4e706097f280be5224f6ea9a0e3fd3b660ce8
SHA256d2c15535e03e0b1a849179e31bfce5730d66f4067189c4f04658a86ff716f6b7
SHA51260f61e7f6fc3fae5dedf19c4632ac9d462ba20e45edc6c9d519ec77f013e3e67503b0d664dd4448618aeb0bf21e96a2fa260c2a23b83782651780086deb4eafa
-
C:\Users\Admin\AppData\Local\Temp\3582-490\d51d58e678f0955cad08b64397c5c24758d7c7ec85e3c26bba51678301a5679dN.exe
Filesize9.0MB
MD590f99beeee0cd6353d467fad14cb9fd5
SHA13d497d47949ee3dfbf9ffa6c5564c319904e4de1
SHA2561719f5e130addd28fdbca6b27be71b305efcf4c5b391a3aa6112890a079eeb4b
SHA5126e1e59ddda8407842035282905ab192fb245eb7c3c208ea67b72362c4f8461c16a6baba42149cc8909e8b08112645fd53be9378d665dfdb47fa533160f28a0bd
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
22KB
MD5b886808b166cb7adbf58e83e37e6a40f
SHA1223ef2cd69071939373caf9cc144daeea3576d3e
SHA256977d6165f7d90cde7596a0e957d2f41c6bb2b851431faf6e11827ab4797c87a9
SHA5123d9ea0a6078f9078beebb801d0c18f26db47ff912298244010fb341ddc6bb86b850a70b3d93556c02cb3a753c3049599152c4953956ec15cb0ae715ebdd33e09
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727