Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2024, 12:52
Behavioral task
behavioral1
Sample
c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe
Resource
win7-20241010-en
General
-
Target
c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe
-
Size
1.4MB
-
MD5
12e347e158f019389307ddb157078a5c
-
SHA1
7a5d5f03f4c50ac1faca4fbd10c9a28ca92b6ab7
-
SHA256
c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b
-
SHA512
5c3a0c034675420a9942cf248839d570aff3cec8be34aa0e61d35665d77bd8f83b84479d6418499b69404ec067605245ed60e7c266ca1be75cce40107ede4707
-
SSDEEP
24576:qsLp0FasdJu/+/dfMs2KLoyaU/5DeTgtMyPtToFQo/NkGd:XpncZO+HCyPtToWoVkGd
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 iplogger.org 27 iplogger.org -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 4672 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133794319740116982" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe 4988 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeAssignPrimaryTokenPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeLockMemoryPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeIncreaseQuotaPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeMachineAccountPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeTcbPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSecurityPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeTakeOwnershipPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeLoadDriverPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSystemProfilePrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSystemtimePrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeProfSingleProcessPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeIncBasePriorityPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeCreatePagefilePrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeCreatePermanentPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeBackupPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeRestorePrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeShutdownPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeDebugPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeAuditPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSystemEnvironmentPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeChangeNotifyPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeRemoteShutdownPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeUndockPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeSyncAgentPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeEnableDelegationPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeManageVolumePrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeImpersonatePrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeCreateGlobalPrivilege 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 31 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 32 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 33 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 34 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: 35 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe Token: SeDebugPrivilege 4672 taskkill.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe Token: SeCreatePagefilePrivilege 3532 chrome.exe Token: SeShutdownPrivilege 3532 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe 3532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 772 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 82 PID 1512 wrote to memory of 772 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 82 PID 1512 wrote to memory of 772 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 82 PID 772 wrote to memory of 4672 772 cmd.exe 84 PID 772 wrote to memory of 4672 772 cmd.exe 84 PID 772 wrote to memory of 4672 772 cmd.exe 84 PID 1512 wrote to memory of 3532 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 86 PID 1512 wrote to memory of 3532 1512 c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe 86 PID 3532 wrote to memory of 3148 3532 chrome.exe 87 PID 3532 wrote to memory of 3148 3532 chrome.exe 87 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 3752 3532 chrome.exe 88 PID 3532 wrote to memory of 1296 3532 chrome.exe 89 PID 3532 wrote to memory of 1296 3532 chrome.exe 89 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90 PID 3532 wrote to memory of 2272 3532 chrome.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe"C:\Users\Admin\AppData\Local\Temp\c40a21adab3a63277e8a70c92357979bb770ec4c18dd223dd70fe81bd134531b.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc3d5bcc40,0x7ffc3d5bcc4c,0x7ffc3d5bcc583⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:23⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1776,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1952 /prefetch:33⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2436 /prefetch:83⤵PID:2272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3128,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:2216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:13⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3828,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3844 /prefetch:23⤵PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4736,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4684 /prefetch:13⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4912,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4928 /prefetch:83⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4956,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:83⤵PID:2644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5144,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5316 /prefetch:83⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5308,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5280 /prefetch:83⤵PID:3692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4964,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5344 /prefetch:83⤵PID:1516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5456,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4960 /prefetch:83⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5636,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5288 /prefetch:23⤵PID:2916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=208,i,6637880920742117838,4304418032900666398,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1176 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4008
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2468
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
Filesize
6KB
MD5c8d8c174df68910527edabe6b5278f06
SHA18ac53b3605fea693b59027b9b471202d150f266f
SHA2569434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c
-
Filesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
Filesize
19KB
MD5f4d23381cf9c3ac87de46e3bbd635002
SHA12f46a56ceff39ef334b362da94128c954afe41af
SHA25612119bed261a5a8698ea53554727c96b23abec875dd0ca1f6c3f63119b38ce94
SHA5123b592efe0fb2e15be04f806be4b02e1245069d7efb3aa966f92a2361c2c7cf210698e99abfe26f760b6288f5803ec5515ed8068bc3d109baac68cdc6c7c78ba1
-
Filesize
3KB
MD5f79618c53614380c5fdc545699afe890
SHA17804a4621cd9405b6def471f3ebedb07fb17e90a
SHA256f3f30c5c271f80b0a3a329b11d8e72eb404d0c0dc9c66fa162ca97ccaa1e963c
SHA512c4e0c4df6ac92351591859a7c4358b3dcd342e00051bf561e68e3fcc2c94fdd8d14bd0a042d88dca33f6c7e952938786378d804f56e84b4eab99e2a5fee96a4c
-
Filesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
Filesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
Filesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
Filesize
1KB
MD56da6b303170ccfdca9d9e75abbfb59f3
SHA11a8070080f50a303f73eba253ba49c1e6d400df6
SHA25666f5620e3bfe4692b14f62baad60e3269327327565ff8b2438e98ce8ed021333
SHA512872957b63e8a0d10791877e5d204022c08c8e8101807d7ebe6fd537d812ad09e14d8555ccf53dc00525a22c02773aa45b8fa643c05247fb0ce6012382855a89a
-
Filesize
649B
MD5d96c53df6068871e2af6227eadd22e9e
SHA18345190401c74d301860da795489796f536e620f
SHA2560e2962ed7ca745c37306b24e6613add40ad5334a2936e8f9f1388864d9182fb4
SHA512491cdb857f590ae2a322a1c2506a3205e33752a372ccf87b097b77595a5d9b5c5478e2ee1e8ee3c4e0d2b33ee397021fa146186f10e1b4a543bca8f6489ac1e4
-
Filesize
168B
MD530562a99ad48da9c864db5acc68d74ff
SHA1c077a3f25bbae29a2dcc6e11c1e36f868cac6494
SHA256e7e19221bc92e20064e4d12847eb9f3db1cacf7a60b647fcd9d5e4ee21f06a21
SHA5128dc0f5e1aa46d890a3738041846223a95c3d7d44faa60fce49ded28d1620953599bd81fd366e80bcd4e63e394f6ee61f785b23c9e7d9fcae43a3d11d7c84fa79
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD50725522ed1e9fc02660a30fb0518dc57
SHA14c04e3ddfad78364a740f3029ceffd99cd5de5a4
SHA256e1af0c70abbd95faeb2cf691fb72944f983cf05889687eb6998d5e458736a365
SHA512c3abdbb04d3f88f99a7acd2fe7fc3da7db9d709db3d73e2243f829b8c9e6847529dd316a38edf8e35402831f69dc66a93bb4396046e3fd95886bde0232bd7fd1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD5c78e6a247f46a1540b13de86c221a146
SHA1b077c91d19ac62d748cd3c1d43b2bb23ad355873
SHA2569a9c12b8fe8e2d83836eb4f2a2804d51804ac6c458432907e0102a00dba6d265
SHA51277c3e89c6c81d3b351be1c9480c276a875f73621c7a39bf11ae8f4e7574efa3b03ed69421e59d8c020286ab1abf3ef50c5eab0f083143d8f5d344a40eb9c330b
-
Filesize
859B
MD5ef8cf4b65f73e2c0d02afefb7cbae752
SHA14618af3e276c1bda50d59b168d27a0a4635af567
SHA2561b42bf7c60c7a6bc55fab18ed2902b266380c5d22f797252d7f9dc1198b98911
SHA51294d13c54bb869a9fcbea59694b1d534b33db2764a8c1dc94db5e77a64fb8885e1921c54dd6721a47a87aa7d0790fa11677a092b645739a8fe9a221310405ba2c
-
Filesize
859B
MD5afec4b70374a0014813b54fd3b4896ca
SHA1aea20ee7946faf977286847389e512ea7186565b
SHA256047ce0e36811b6b1ad8871a0e0802cfd47c248f90b5a1ed6d763199b5dd95448
SHA512ef0ee09c4334c7dbdf711bb4a447931541096568f02a6c537f3f3b516f8da0c2e0431c1505d9a0020604d432b315c8cef23f9bf97997f809952df97974776e03
-
Filesize
859B
MD5d09bbd1cb3693fac0f48ea2e15a0a427
SHA10ec60a7fd0d83c4507e41e4f4ab7501751129c5f
SHA2563fc8b67049d2e28dc2d5cb34c847c7c7f9a1bb54306ce22a90ff97d50b1c0c88
SHA51232213f0ca6bc3ae87d13226511961fe02a256824690caa1fb272b8d408714497214f3f07ee28dff5e94ef1e558f4e32bd0995150cbd088cce99e012f6013f3a0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
9KB
MD5b49844b1ddbc2eebcd82152b1259ec17
SHA10b4892f200eb47db25b1b0cd505f9ec3effa0ca1
SHA2567c6dafa30218f0ce16d3187f47cd812fc0e6bdfc18d7b95a4e9ab94eb8e91ec2
SHA512049777f5cc525e0a52f5ef1348b0e3c84d4f2ecde51d4004172f2c2968507dc2a72956c5f62f1e2baa3e8b81ff18f5e697ed87536d9c29359c325f48dabc9701
-
Filesize
9KB
MD5e65abe144b721ab6c431f27836143972
SHA1fdffa4e95f1b3fb94cef9e351fbd9d900fe2a85b
SHA256597bfbaf2554cf79d92da87be233bfc735b4da2d8a9e7efd565bbb036175b758
SHA5124d532b46d3da7d5775fbc8e2de0b0d372ac239ba27736ad37a0dd707b9086b0dd573e9d8d7cb0d774c85fd5194d7eb0d1749aa5ec979af8df833f82d8cbc115b
-
Filesize
9KB
MD59b13a9047b5dd9c9647c24faf9e2f0ca
SHA1e897191b7989fece8a251cb71d8c154f368e2cb6
SHA256710d87bd4f5fbe09d1b7f5ebcc3672722ca611b0b94e4322960642e1fecd7f44
SHA512bb511f1aca52524bbecfa3760aec5b2316fa292da77cd9122f58fe31c3dc56d68c82d4cfa8ac3839309864d4b880184a4e55c46a507d35ce4b23e6d13b82e9bb
-
Filesize
16KB
MD5a43b0280f1e72f2f3d3806b1af168428
SHA14e7e830e8594ea90127ff93d174760840e128be6
SHA2567cc900f4407c2b680b78547acb942492e6aafd915986a94962214681dcf53222
SHA512c030d07c087d236a3bb00845905df441851b2cc352b12489551685271e9077f5a105a0524084daab987a4fe9e8a9a20333fa3931aeef2727ef2ba79dd3e793ee
-
Filesize
16KB
MD5eec1c35d84f8d2e86e88b5f2d9e7084a
SHA10760679123b1feb1cd2dac10008a8cc43fba5578
SHA256ae1f801b2e9e5c35153c83d4e6a78311e52b91a0f21a2adab0436a4ed9513ebf
SHA512467a0b6430eee814369cc535eaf1de4d180560dfc0e041b3065555d1064745625d93a8311ba756f4926b6a5e6f30a1cce397fd5fbd26eb5326ef1c0a23bd7ab0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD57fc39fe63a303ad1a23ddf737e05a476
SHA1ba14e6da76245d0bd5db074dd74bd006b57385fb
SHA256e74b04f00c83fc9223e9b5e9c95233062ab9ed2576b9e00ce836a861ba5fce55
SHA512d5e9de88f15404cb284c11773df8161331d16c07a4fe38b89bae5dfa54f35a2495e27ea14ab82574d7e372b27ff42fd31a8e4980cad131976321b58b43c0dfd0
-
Filesize
231KB
MD5360babac0d8f2b1a5256b95adca0fa63
SHA13a644bf6894480bcdbb554ac23e91fa6efdf6c4d
SHA2562d28ee2e67c4efd3194d72061cab07feeb9ae992dadc2c8a8f9ad95bd2362121
SHA5129708b8047d7ba049552df7810941625b32d56d36dea44b28b50fc83a19e40645715f97544301f730986084c2e2d8855b56e398e4d7270b2edec7dd57e8d532d1
-
Filesize
231KB
MD501738c3cd4b4bc344832e898762e7c0c
SHA10cfb0673e57fe8220f0187c275cb0feaaef3f6ab
SHA25634f90a5268c868eff6a0f6b40e399bcbba1fbeb89f03356fb90450d93dd253bd
SHA512ad0a35a961e90810dc4ea1f5305bdd18deb7a5ffd729ae457fe680f68779ab68754ce7e04c462ba611d7bb9eb74536c4397623a58ddbdb54fceaf055d604381c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c