Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
78s -
max time network
79s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2024, 13:15
Behavioral task
behavioral1
Sample
VapeV4.exe
Resource
win10v2004-20241007-en
General
-
Target
NiceRAT.pyc
-
Size
16B
-
MD5
3a0d4309583f2f5b242e352130abcc01
-
SHA1
f69758b7687c4337f7235fdd9e8723c49d254287
-
SHA256
bf8b7ac42546a146f1ebf72707d283fef6ec43b82522f07d39ca1251a9cf0ef0
-
SHA512
e966a8aa2752a3054cbc5fdb0a05e4edcd5e379f3536d074151e5f9034408cf7b70260f2d1bcf7d4e8bcf633264850d76696164d49b4d2de64d06ed699745d55
Malware Config
Signatures
-
Detects RedTiger Stealer 56 IoCs
resource yara_rule behavioral2/files/0x000b000000023b8b-34.dat redtigerv122 behavioral2/files/0x000b000000023b8b-34.dat redtigerv22 behavioral2/files/0x000b000000023b8b-34.dat redtiger_stealer_detection behavioral2/files/0x000b000000023b8b-34.dat redtiger_stealer_detection_v2 behavioral2/files/0x000b000000023b8b-34.dat staticSred behavioral2/files/0x000b000000023b8b-34.dat staticred behavioral2/files/0x000b000000023b8b-34.dat redtiger_stealer_detection_v1 behavioral2/files/0x0007000000023d82-468.dat redtigerv122 behavioral2/files/0x0007000000023d82-468.dat redtigerv22 behavioral2/files/0x0007000000023d82-468.dat redtiger_stealer_detection behavioral2/files/0x0007000000023d82-468.dat redtiger_stealer_detection_v2 behavioral2/files/0x0007000000023d82-468.dat staticSred behavioral2/files/0x0007000000023d82-468.dat staticred behavioral2/files/0x0007000000023d82-468.dat redtiger_stealer_detection_v1 behavioral2/files/0x0004000000023278-471.dat redtigerv122 behavioral2/files/0x0004000000023278-471.dat redtigerv22 behavioral2/files/0x0004000000023278-471.dat redtiger_stealer_detection behavioral2/files/0x0004000000023278-471.dat redtiger_stealer_detection_v2 behavioral2/files/0x0004000000023278-471.dat staticSred behavioral2/files/0x0004000000023278-471.dat staticred behavioral2/files/0x0004000000023278-471.dat redtiger_stealer_detection_v1 behavioral2/files/0x0004000000023265-478.dat redtigerv122 behavioral2/files/0x0004000000023265-478.dat redtigerv22 behavioral2/files/0x0004000000023265-478.dat redtiger_stealer_detection behavioral2/files/0x0004000000023265-478.dat redtiger_stealer_detection_v2 behavioral2/files/0x0004000000023265-478.dat staticSred behavioral2/files/0x0004000000023265-478.dat staticred behavioral2/files/0x0004000000023265-478.dat redtiger_stealer_detection_v1 behavioral2/files/0x000a000000023d83-484.dat redtigerv122 behavioral2/files/0x000a000000023d83-484.dat redtigerv22 behavioral2/files/0x000a000000023d83-484.dat redtiger_stealer_detection behavioral2/files/0x000a000000023d83-484.dat redtiger_stealer_detection_v2 behavioral2/files/0x000a000000023d83-484.dat staticSred behavioral2/files/0x000a000000023d83-484.dat staticred behavioral2/files/0x000a000000023d83-484.dat redtiger_stealer_detection_v1 behavioral2/files/0x0007000000023d8c-513.dat redtigerv122 behavioral2/files/0x0007000000023d8c-513.dat redtigerv22 behavioral2/files/0x0007000000023d8c-513.dat redtiger_stealer_detection behavioral2/files/0x0007000000023d8c-513.dat redtiger_stealer_detection_v2 behavioral2/files/0x0007000000023d8c-513.dat staticSred behavioral2/files/0x0007000000023d8c-513.dat staticred behavioral2/files/0x0007000000023d8c-513.dat redtiger_stealer_detection_v1 behavioral2/files/0x0002000000022187-529.dat redtigerv122 behavioral2/files/0x0002000000022187-529.dat redtigerv22 behavioral2/files/0x0002000000022187-529.dat redtiger_stealer_detection behavioral2/files/0x0002000000022187-529.dat redtiger_stealer_detection_v2 behavioral2/files/0x0002000000022187-529.dat staticSred behavioral2/files/0x0002000000022187-529.dat staticred behavioral2/files/0x0002000000022187-529.dat redtiger_stealer_detection_v1 behavioral2/files/0x0002000000022188-538.dat redtigerv122 behavioral2/files/0x0002000000022188-538.dat redtigerv22 behavioral2/files/0x0002000000022188-538.dat redtiger_stealer_detection behavioral2/files/0x0002000000022188-538.dat redtiger_stealer_detection_v2 behavioral2/files/0x0002000000022188-538.dat staticSred behavioral2/files/0x0002000000022188-538.dat staticred behavioral2/files/0x0002000000022188-538.dat redtiger_stealer_detection_v1 -
Redtiger family
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133795197733246264" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 940 chrome.exe 940 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe Token: SeShutdownPrivilege 940 chrome.exe Token: SeCreatePagefilePrivilege 940 chrome.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe 940 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4688 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 940 wrote to memory of 1436 940 chrome.exe 108 PID 940 wrote to memory of 1436 940 chrome.exe 108 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 4860 940 chrome.exe 109 PID 940 wrote to memory of 2720 940 chrome.exe 110 PID 940 wrote to memory of 2720 940 chrome.exe 110 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111 PID 940 wrote to memory of 3972 940 chrome.exe 111
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\NiceRAT.pyc1⤵
- Modifies registry class
PID:3084
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4688
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4840
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffd0b89cc40,0x7ffd0b89cc4c,0x7ffd0b89cc582⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2092,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1736,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:32⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4540,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:4728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4876,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4884 /prefetch:82⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4916,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4900 /prefetch:82⤵PID:4796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5180,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:3364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5312,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:2920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4412,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4500,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:4868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5536,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4512 /prefetch:22⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5152,i,14757997611204951718,1553199502452481931,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\57b3e566-2774-4b59-b22a-ab6066517002.tmp
Filesize9KB
MD5addee6593566070708b5dcbffaabde02
SHA1031a5bf185ff60610bf73ca5f4b1f1cbc7f4b5ae
SHA256cc63aa05a3bbd139ca70a8c6baf544a97bda0fa0ce76dfd188bd319baea12bd0
SHA51289158a215e68baa7849f8b1cfc2af557c669f7739acb13222f1086e9dfd9249a82f110c68b59d17538ec5ff5c0278fc58b03bb515933f00e0c7dcce1567e0231
-
Filesize
649B
MD5b32baa14ec62efc4f6133ed22c697db2
SHA10ac0427107f3d977e37e332427a1f587d4d40d69
SHA256a6604ae0786d0252104991b568f2b4e15f724c66c7d10fc0796b29b28e6a3a0c
SHA512156bc2b5b76f09a169034df0e83b7f1722dfecf9bb29e4495b466b7cc182caa644c601b0f063d54301fb7b3b4889e34c7298dcd340aab4777106c9f71af91d6e
-
Filesize
384B
MD5cc05ba4b98354d9b2809e6e9f6c225c8
SHA15e117964f07db68fbaf0a6c08414ea5a1b718142
SHA256af76f096a7b6dc64f60c66068089a65a905eea5c8dc21de0e0bf85936c9e92b3
SHA5129020c0f15825c86c9dbe4fa239ebda83573ee28bc36b0d03807e7c56e8c0445c5f9bc8716edf358741020b0ed9b657fc869ef051e548216208d268d4c31556d4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD5a6bb5a07cbc8e1f655f9fc838e415d55
SHA1b0f2f35e92750af73c05e386160605df28e3fb80
SHA2565737e02bf982a7b7bf00ea213aeb3f623a99fca9e370c8142f50ff410e58396f
SHA51298e9e7884e3e9855a92f205412781e6df325c685867843b00954860792736cdcd9e61ccf18ba9b9a54b12d40a91e649be33c249570eee9707c7dfb630d9d5afa
-
Filesize
9KB
MD5aed051b6bc167fb66d95bc3004c88edf
SHA124b3eac2b316e421172b9893b47bd9ab236176a8
SHA256fc25babd15ff0b997020e09885a19bec59c76b72e9e4a48c11875467c30528d5
SHA512be68bebaf658d520cfd5c875ad96dde912c5a162df091c49085602f275232cde60858e6db1fefaf43c50e0bfbb50d8af688c4f5a53c5fc0890a8ccdc49cfb1d4
-
Filesize
9KB
MD505f0291984609bfaff5187516f48856c
SHA1f312cd368bb0fe728aa006e2c6a881e9532ceb4d
SHA25694b2e4c9165f65312a43cb1ac72a50e4fa42f8bccebe586426da1a5776cd6338
SHA512200f80abddc263d34dc4f4ec9b7ea0c519e58a2d6b05c956fb64d7e196d4fff02e9bf76216a5d63183eeb8f01186a100feed3425faf1085ee7c8741ebf8e97a9
-
Filesize
15KB
MD569da2a414a7dc9d0ed324353ce51a01c
SHA122c7f3de800ee6dd096c3bf4a628d078a5d4d4c8
SHA2563bd17d07ab2a6dcbf6c0245a0a504f86fb08fe84c022e473854c342fb0828fc3
SHA512f0e471def7eb050348b15860bbeb16f8dbcb6ae6464cc551ce316c4c1390e0746b7bd13fe1d70e20b4b4e848eb886e9f0b785fe252c0ca6f3eee271f339e5149
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5869bac689f2d230def3bc4a4375bb9df
SHA1781441e824faf72edf4cded60f67cd206016b7db
SHA256f6a933f96f6c9492d7a46115d4308fd4e7dfd7a4ff3e268873b8e402d264a51a
SHA5128fe2d6268d5ffe3530a17f0ef02f34ba15df7d39b4d055bef71e20af29f3fb6071f86587e60d258aad95ca93a8e83870b4f1a943f5a1d506e8b8a80166774747
-
Filesize
231KB
MD54a15fc80d78cb2f18325512c443b1abc
SHA11b637f646e1ab8d91e6dbe8b3a65069738d6dcac
SHA2564a143ffe6d6d5cc9b3817d19497168d095ab5263899bb01a495fff0541f649fe
SHA5121063490b2cbd62bebf5541e316ff035989110fc86604f906a00310e65d8a0abad3111207df994b3e87825cb322cc5bb1563c853aabaaf2a4fa248d74e99781d1
-
Filesize
231KB
MD5f6dde20ff8f1c58a7b02bfe46083d94c
SHA196a26b1f028fba2d997a6538186dc33f6df01fc0
SHA2567d67477a0a68b9fbb5a8da1220563b91717fc5686dd99096e6d5c6df463fd815
SHA512f16e9e6a6e02e5dea9663896abe45d8ba18549e1c5e547dcbac64350d863f300282f15cc8c9555e2d9dcd1361b821a75cd15f1dd75bc6428ed33707ba2806577
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c