Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 11:29
Behavioral task
behavioral1
Sample
cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe
Resource
win7-20240903-en
General
-
Target
cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe
-
Size
1.4MB
-
MD5
53f9ebac4ea17afdf3753774a1427795
-
SHA1
c83b5fe68db8b583569085304c274357e530bfb1
-
SHA256
cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682
-
SHA512
58af5d5d6a3e69d2a24701e579c48e75e24dcdc255427106cea8a01cc389f24228932be18d7b731e034f1c7563b4d721a8ff484686c293d04574ec2b7f4d59bd
-
SSDEEP
24576:uTpE4t7hXTv1Rpgt1E7y2NfXG7E3VQ+gvLJegPeR1nMFAwic:ApdF1w+lBq4gPeRdMmvc
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 24 iplogger.org 25 iplogger.org -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3180 3496 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 2972 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133795134049611603" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe 1928 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeAssignPrimaryTokenPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeLockMemoryPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeIncreaseQuotaPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeMachineAccountPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeTcbPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeSecurityPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeTakeOwnershipPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeLoadDriverPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeSystemProfilePrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeSystemtimePrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeProfSingleProcessPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeIncBasePriorityPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeCreatePagefilePrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeCreatePermanentPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeBackupPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeRestorePrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeShutdownPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeDebugPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeAuditPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeSystemEnvironmentPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeChangeNotifyPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeRemoteShutdownPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeUndockPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeSyncAgentPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeEnableDelegationPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeManageVolumePrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeImpersonatePrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeCreateGlobalPrivilege 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: 31 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: 32 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: 33 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: 34 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: 35 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe Token: SeDebugPrivilege 2972 taskkill.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe Token: SeCreatePagefilePrivilege 2916 chrome.exe Token: SeShutdownPrivilege 2916 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe 2916 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 4612 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe 82 PID 3496 wrote to memory of 4612 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe 82 PID 3496 wrote to memory of 4612 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe 82 PID 4612 wrote to memory of 2972 4612 cmd.exe 84 PID 4612 wrote to memory of 2972 4612 cmd.exe 84 PID 4612 wrote to memory of 2972 4612 cmd.exe 84 PID 3496 wrote to memory of 2916 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe 86 PID 3496 wrote to memory of 2916 3496 cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe 86 PID 2916 wrote to memory of 2688 2916 chrome.exe 87 PID 2916 wrote to memory of 2688 2916 chrome.exe 87 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 1248 2916 chrome.exe 88 PID 2916 wrote to memory of 2148 2916 chrome.exe 89 PID 2916 wrote to memory of 2148 2916 chrome.exe 89 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90 PID 2916 wrote to memory of 2080 2916 chrome.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe"C:\Users\Admin\AppData\Local\Temp\cc5533a5c8e6305e52431676f148f292fe276ed951d39ade86c143c9e47a9682.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff23f0cc40,0x7fff23f0cc4c,0x7fff23f0cc583⤵PID:2688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2008,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:23⤵PID:1248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1800,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2140 /prefetch:33⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:83⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3120,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3140 /prefetch:13⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3172 /prefetch:13⤵PID:2244
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3836,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3860 /prefetch:23⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4744,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4772 /prefetch:13⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3648,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4932 /prefetch:83⤵PID:1764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4916,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4912 /prefetch:83⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4924,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5300 /prefetch:83⤵PID:1964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4952,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5372 /prefetch:83⤵PID:4264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4932,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5268 /prefetch:83⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5352,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4748 /prefetch:83⤵PID:2796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5456,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5360 /prefetch:23⤵PID:892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5464,i,13862823387354114923,9089533600104737763,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5144 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 19642⤵
- Program crash
PID:3180
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3496 -ip 34961⤵PID:4692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1816
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
Filesize
6KB
MD5c8d8c174df68910527edabe6b5278f06
SHA18ac53b3605fea693b59027b9b471202d150f266f
SHA2569434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c
-
Filesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
Filesize
19KB
MD5f726ab9e69ccaffd9874178b2d50853f
SHA112d68c26570a9c55d78bcfe892f69086e5f7c5e0
SHA2569ed9158c1d5d5a587b49cc0112191c480d80c9b00c56ab5b4d8225332a3e7b7a
SHA5125d5377d04e350f7c51a2c94b261f64a287d1efc758035460080c6dd9022459c37cffbb051eb44453275d5ad1a50f0f97c3b58ff4aad7a99f35948bf2f3cf78cf
-
Filesize
3KB
MD5368dbd669e86a3e5d6f38cf0025a31fd
SHA193c6f457d876646713913f3fa59f44a9a373ff03
SHA25640d6653a91bd77ecbd6e59151febb0d8b157b66706aab53d4c281bb1f2fe0cd6
SHA51224881d53e334510748f51ce814c6e41c4de2094fd3acc1f250f8a73e26c64d5a74430b6c891fc03b28fb7bddfcf8b540edcf86498d2bb597e70c2b80b172ee7e
-
Filesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
Filesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
Filesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
Filesize
1KB
MD56da6b303170ccfdca9d9e75abbfb59f3
SHA11a8070080f50a303f73eba253ba49c1e6d400df6
SHA25666f5620e3bfe4692b14f62baad60e3269327327565ff8b2438e98ce8ed021333
SHA512872957b63e8a0d10791877e5d204022c08c8e8101807d7ebe6fd537d812ad09e14d8555ccf53dc00525a22c02773aa45b8fa643c05247fb0ce6012382855a89a
-
Filesize
649B
MD5ede80e42b0fcad8f23cc3370a5d6200c
SHA194afc6d04d57b6b32c07ac2718dad9b7c5bbf6a2
SHA2561c963be8455a65314f539e15a60e54bfe17347be52f4877f5be2b351cfaaadc5
SHA5125bb001baa65245144c06f759ad59ca08a7b3ca3dac2d756da70f4fc2d24eb6e7d7453027350b8d6f8504af872b67712bd1401a3397d51eda14ba48a506a2a50c
-
Filesize
168B
MD54fc58be59100c6d7eb4ddb0475fd6b8a
SHA14dfb92547cb979d5cb37705f4f862eb9e662cb59
SHA256445b23ae2f68b45ed4e94c4bf313c67505f3517ecd51db13f7dbd6474e8ae1f5
SHA512b5a740db23ac22d4809371831a1fca1436f41262b51f50f6dccf4933d1516ecb77835a46b7e0bea20244437e6531c5512f210664be53cc5ddd82008a70394726
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD5e928639a5cfe60352b0d91e9f01ac7a4
SHA1c3f56eeb2f007a32ca84d093b7ee1ea4a63a4673
SHA256b5f1a91d50eb50c8afe196143fd4e816d28f3e82225de0f9c59cdb5bb2d47c1d
SHA51200adc62f4d6ee1d1ee314ea452f59ff7baaacb357dcaad8f0745d328a4783c6f4437473d6dc0ce8fd58c202653a7d3f7fec661d0f6efa92c62ca1d31e952f3e6
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD58a9b372a947f03bd28af3868e3b469f2
SHA1e7e82055c9c88dd9ef5b76d85ec59ae6729f2846
SHA256e158af57b4f8ade69408ebdf29846970be3dc731cae2761056dfebbf1c6a1b15
SHA51272d6cc73b4b52399b877317abbd53f9fa8645ac8541dbf43e3a9d6355414d0e370f4666aa856f66e13c72cdc9d8df28f298e053b797216a3c9c77c62eca72f87
-
Filesize
859B
MD5e8d71d799bd42f2eab74fbf5d4d6b80b
SHA1ee09c456c8f314ab9df4a6aa5b024101662a8949
SHA256879fab414587814f57cfe0e038f22d9272ea83add2442447c40e9410b948dc0e
SHA512eb7f0bdf3a507994d1daf631f7a7a3c5d8b752e47395ceb0c6949e350305c55943dee398330b9ff5d72a23462c4de1d89f3510a24b3c6a1b190ad6823ff64812
-
Filesize
859B
MD5e7c75e5b95e7bfe4eee352d7f68b89a4
SHA1f9694af1376ffaf3b59e846dbf80b9f05188183c
SHA25660f9c727248e8ef35ba0223402ce1c0872de8f8cb881af0d292a7bf6c77fc088
SHA5124c357278321820a69e7edf23becba823ca6190f63848ef797d3dccdb89f19d2a10a814d7ea9f0fa26b9a5ca85f63f7b1ec05dc230a711dd299884397bc9356c3
-
Filesize
859B
MD580dff948f70aefa539423d414d0127a3
SHA1f8cd10fda7e7baf198ac0f847657d3422c9daab9
SHA2560c5921117bc28daf9777f86499477d1a41bde31837d24f4b69a769d94793b951
SHA512b1b5ab9965bd2a4041dbbe1a417992c2a0b7c4d6569d38ab2d1e5a182c9f22a81749d73355dcbcd43722df17452745bf56562c95fbaf00c6e7818a8217a92f80
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
9KB
MD5623952ee0cf2d02d9d42422c0c88ca0e
SHA10c0ba6b6d45a21b07238170a3ee599ef15c8c6c3
SHA2569ff4b0eb89e94ae2592012f8539e9a0f2a9570074959408de24231a4143bfbf9
SHA512b94b0ebc8b95ffe4576f2d9e96eb4af0deb3339e43facb12469e43d01178172dc0923a74d08d722cedbc52f75944b664b06d5b459d23fea54d390dd14d919b11
-
Filesize
9KB
MD5cd2f69d72df33b0e8720172939ffb85a
SHA128b10daef4a505ca27af8d64e438b6eac1e2a51f
SHA25697860323ef6185916cbf145c5c4ac3c651f8822885eb5ece397bb7e537e49509
SHA5120e8f0c2f6060b29506a26ae494cee7728235570dd783954b5e6497f278704f30650d2872b0632a6db4e0aad3fea9c5136758e4dcc08f90c222c669257fafb9d9
-
Filesize
9KB
MD5fcc2a5ff5e8fd55f6611d13eea16bfce
SHA1e4090ce9770720f7668a0a1b21878f371a99ab1d
SHA2566a54b228d2dc990ac98dce519047e3889ffe0cccd8192ffcea509f94e03a1a97
SHA5120fb3223f62193d673d2fa39a65bdee12d56ffbf05418d270ff548076efd016f375ac3a7587bde69b79aab1fff820076d25a63cfd71f2f3641d2104752559fba8
-
Filesize
9KB
MD5d73e1245fecd77df8335449496885c1e
SHA1bed744fc79c93ffb7f4de292166d0ed2d279b170
SHA256bb8e6f6f35ef400bfaf7c98f249394cfbe67adf06c3760988aceafa1188098c5
SHA5123184c2a5cd46b0a72708e3622df6a8acb384ec0267d7b6f4887260a6c1b8695a097369f25358c61f1e0337188c85a2017d125838406ce9214df23c3b43755936
-
Filesize
9KB
MD563a79fe58439fbc2df668f2fcf98e92b
SHA1c63b40ab0bf0fda6b1ff2e4c76f989944af83fc1
SHA2563c2415f7a906ab1e53b6579792a07aa6f2f0b15b7776b9ed5d9499e647e647fd
SHA51220152e31ae2bab5c3622c0331df359ad697f7c09353fd76b89cb09ea361c4337b8e3bca85e5b8f3dcca6b9d7238aff5a7973e14e812b187f031522a7b0f87c9c
-
Filesize
9KB
MD5a2a632226b53673cc2779ee847bb9de4
SHA16ce91c15db0958817ae7aed161cf0a2bf799ce93
SHA2560fa496a2f0d7b37d18d431712162dc5fac78744ada8ef3e78997b55d33336455
SHA51201ca58b7d16de53439a84c8ef956e0c3bde3a96ee10b8209b4c6ebde45df55b922861cfcd55be334bb1d20e6b279380dd8affb9a7849f5c75ac6c8dbb4e2c64b
-
Filesize
16KB
MD50a05d8702584c3f0cb2659414970db32
SHA163779f9a33228d57d8005263f8de07d0a1f2ae28
SHA25692e11edc3d8705fc14b4e1dd97a30c5c629fd9b148a04825145efaf96a87e379
SHA512bac41ae42dedf68e73ed820c51ef309d7e5233af54b12184d3ad27a31101e45f96598324499b4a30bd380a1bb8cbd8912332b5b363b5e67b8c05b9f8f240dcc5
-
Filesize
16KB
MD5eec1c35d84f8d2e86e88b5f2d9e7084a
SHA10760679123b1feb1cd2dac10008a8cc43fba5578
SHA256ae1f801b2e9e5c35153c83d4e6a78311e52b91a0f21a2adab0436a4ed9513ebf
SHA512467a0b6430eee814369cc535eaf1de4d180560dfc0e041b3065555d1064745625d93a8311ba756f4926b6a5e6f30a1cce397fd5fbd26eb5326ef1c0a23bd7ab0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD54ef1cf1ea6595fcc2ebc546ff9feba2e
SHA19d6cc3e6f2c5ef63b43781fb5fc24f9e48904dff
SHA2561e059299b476f2fe354ddade0cdbaf4c432858f32366b37008346658cdb2919b
SHA51282e2df78cddcaa28e3ca9d3773fc4e5efd4971817abfa0a239b1bf68ad6e3935a894bf5e4e943354196dc6ed9f064ce217fac3e4a7fde4ba8393d0fa84b0db9e
-
Filesize
231KB
MD5b19651891d4921b777de2650655fd1da
SHA162e1e76195a29d5e7eeb97ff6d6e826dcc6e6934
SHA2566f57abb26c54bc5bb161e38846c3b55f09b726486222a822b14a6f6ae472b633
SHA512c465a63b1745ca1543dbda21fa45e4e9bd0c2deb7f5bb238a02e48e9c380afc99ad954f0d34f8d42801770665e3416675e416f491aad8c60118230fe1b787519
-
Filesize
231KB
MD5014b8d4ea4a6ef8bd9b1bacbee10b418
SHA15e8ca64411f1b849fe225bf2ec86ece1e18babd3
SHA256092ac9f84dbe6278908e8d3979889b6b4df3ccdd80f7624a61140a64844d9c02
SHA512d69bffedc60ef343fd425b5193aa63fd3de8974c8f16f121237b7b98d33aa15151588d45c2b30e8bc6cd76df21e207542af01ac474df5760f99afe208c34eab6
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727