Analysis
-
max time kernel
74s -
max time network
80s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 18:42
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Setup.exe
Resource
win10v2004-20241007-en
General
-
Target
Setup.exe
-
Size
793.8MB
-
MD5
9a851a47a9bd2f92c61d2486d1be3064
-
SHA1
3cda31c06db97246705d95dfcf4908eafb514b87
-
SHA256
7c2b51c31a895f2eeb6afe748f11d0f6a16355b01c41f22749043c0da7804206
-
SHA512
90340910dc1ee90ccfe7f451578de67c5ca32b95525157acd8b5bc2e99b9c0b2254bfb58997cc848a0ead871bc3f1e03dbb152d56aa709c4ecd3742404eec27b
-
SSDEEP
196608:6spHQk/ICYcdYtOQYMvm6Iu+8RuJQHIsuRuJyPquRuJXMD349nt3njto03qJbYav:6csCYgIBH2XD349nt3nW03s8up
Malware Config
Extracted
fickerstealer
45.93.201.181:80
Signatures
-
Fickerstealer
Ficker is an infostealer written in Rust and ASM.
-
Fickerstealer family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 api.ipify.org -
Drops file in System32 directory 11 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133795403439452020" chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings mspaint.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2392 vlc.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3704 Setup.exe 3220 mspaint.exe 3220 mspaint.exe 4712 mspaint.exe 4712 mspaint.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2392 vlc.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe Token: SeShutdownPrivilege 4192 chrome.exe Token: SeCreatePagefilePrivilege 4192 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 2392 vlc.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe 4192 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2392 vlc.exe 3220 mspaint.exe 3836 OpenWith.exe 4712 mspaint.exe 2080 OpenWith.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3704 Setup.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 3704 wrote to memory of 3688 3704 Setup.exe 83 PID 4192 wrote to memory of 4940 4192 chrome.exe 119 PID 4192 wrote to memory of 4940 4192 chrome.exe 119 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 5036 4192 chrome.exe 120 PID 4192 wrote to memory of 4952 4192 chrome.exe 121 PID 4192 wrote to memory of 4952 4192 chrome.exe 121 PID 4192 wrote to memory of 1892 4192 chrome.exe 122 PID 4192 wrote to memory of 1892 4192 chrome.exe 122 PID 4192 wrote to memory of 1892 4192 chrome.exe 122 PID 4192 wrote to memory of 1892 4192 chrome.exe 122 PID 4192 wrote to memory of 1892 4192 chrome.exe 122 PID 4192 wrote to memory of 1892 4192 chrome.exe 122 PID 4192 wrote to memory of 1892 4192 chrome.exe 122 PID 4192 wrote to memory of 1892 4192 chrome.exe 122 PID 4192 wrote to memory of 1892 4192 chrome.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\UnpublishGet.mpg"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2392
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\BlockLock.jpe" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:4960
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3836
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\ExportComplete.jpg" /ForceBootstrapPaint3D1⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4712
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2080
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffa465bcc40,0x7ffa465bcc4c,0x7ffa465bcc582⤵PID:4940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2044,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:5036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1368,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2244 /prefetch:32⤵PID:4952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2252 /prefetch:82⤵PID:1892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3732,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3716 /prefetch:12⤵PID:1952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4868,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5020,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4896,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4908 /prefetch:82⤵PID:4780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4900,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:4660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5328,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4876 /prefetch:82⤵PID:60
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5352,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:3612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5176,i,9341213540869587239,15616755255679511592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5604 /prefetch:22⤵PID:5476
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1812
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14B
MD52c807857a435aa8554d595bd14ed35d1
SHA19003a73beceab3d1b1cd65614347c33117041a95
SHA2563c4fae56f61b7cdf09709c2aaf65ca47d3bf9077b1e5eb0eb1e6c5c34923eb9b
SHA51295c6fa9f5b342ef34d896f083700ee12d55723e24aff42805bac5c1aa73f07d0db4f9d435d31a61da187edc2336252dfb38529b3f2b1d2039aa2a8e65d64a7a9
-
Filesize
649B
MD58ad2f92d8570497ef49f9f365702d065
SHA1c35597516134ad3500ddf187b85d7570eb58d6f8
SHA256f08a0bb9dfa3a193ba1752f482ccbc653bb727ce319c75929ed6d6177f34b2d9
SHA5126ab69b367aaa633e2740d729c7f7b7aaddeed7d29159d7c0f0066f867b9a1ec8b29b79715d1cf929133cb69b8fb77883303dfe5097dd319f72efe08b2934ca09
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD53ddcf9c797f67f52ca28c7b09d4e85ab
SHA175c0741562e1dedd2545e512e9177b95046a29df
SHA256622085ced6bbe9748dbdd2cc009ea1deb0a05c2ef371743d53ef3d57193753ec
SHA5120b0d6382772f7b3193583f7a8525a69c905d26cf7609e93eeaf89419d5df23c81f543247176d80da32ad67ddca1a9f8c0d6489c819ae3bdf15e758e9f450d4b7
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD50d4baa103e9ac0d64d71e63f67c5fe49
SHA1bc3b76991041da7e5f079ddcbc3b8a57791124ff
SHA256190bda5b3425a7e714910bb15335b9d324aa7bb347fe94c5147854ce7c4c9d00
SHA51203b93530ba538a1fa0bb10b3842de22b2e236d381e18da296e57c5ba31334d00358ef7705797f598de073b4449fdcec3cf27b991d32bf11411ab8d519b1e9c30
-
Filesize
9KB
MD5a8476b691bcba6d1b3b15e11243a3218
SHA1190fe88fa246a806f0f785fd99778e61e716e3f1
SHA256bd051b00efb8ae5694e874fe8aea77952b7a01b675bf42af59d1dc70349bd45e
SHA5126426fdbcba6ce8669f831f8a58ecef9d24e7e36db32104d36b3f4e09ef2e27f060f6e259bbbb8fee6711219099464dae819ffcbaa296572c1dbe34738652a62c
-
Filesize
9KB
MD56cf4615e8991b8661e5242c337a29957
SHA185dd0602899de272e9f72fd171af082c3b28668e
SHA25627c719418e6adef7b9b758e173666cf50268cc16b95067ee1cdc08ee6780db65
SHA5129c95be773a124446eb5cd76d3ee7d9a40ee8a1013f4e3d3ac943e3a838434d907f2fc380e6a0ed22ba2063b9f94bd00aec1d14765d47b7016a5a64906b3d098b
-
Filesize
15KB
MD509d86d21bdb16eb29b607ab9b03a1b3c
SHA1c69a20ca11164f43363b8cab0f149d149ec97a16
SHA25694764a56343c19170ef3bc23d6ece842647f3c94cba2b8c7a6346213aaf99ca1
SHA51299306eed1b8b373a61fd29a56f8d810cc72bcebaba633823cbce9d1aaa1276fcbac45e39ca23c63a22f5a9eacaf97eacf2d5358210500f57852d48cee71d7e94
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5aba7ed0c3a8558717e8dd409ce4cf4ed
SHA13371543c10146ceb94a4d5ceeb9b4421258a525a
SHA25646d8c899880a4159a4695177ccbc1fc642979d905a31e47edd37124dd7d60d3d
SHA512c159c14b386baa1c2e257ec59c53bbc0a75fc2312463930fe22f933a00163d913f347b558222d976f304e56d9e6edb735dc89bd88cb919a4ffe9a50cb9600a37
-
Filesize
231KB
MD564106a158146b95899613ed13faef963
SHA12b83078db9f078367fdd9504b159c2a91da59780
SHA2563c57283e43fca3b28f0bbc5b9a21d73d55ac85d7502b9705fdfc3f7e0361658e
SHA5127b1a1261239e19ec4181dc2a54c6df76cdcf620e1b36e205f7ecbe881aad27551e410830db1dbc00001befde21a0892418be49632c81a6f2d84130245dfa9086
-
Filesize
231KB
MD5b355db464e99c8a50a83fc9be3f51e28
SHA16493b7a7be035d08f9c096dc401c53504f7a1ba7
SHA256bf48635c94a8f1061966fb4f801cc6997088a3ad2e321701e5f14101aa38f8b7
SHA51228ef27a95da999c62a7b53628093d8b3f4b0e49b41647bbfeb1f27f9cba45d13aed6e615533bca6d856be28face8d82d20d5026432410c800a5f79994d2e7a79
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727