Overview
overview
10Static
static
10xmrig-6.22...64.sys
windows7-x64
1xmrig-6.22...64.sys
windows10-2004-x64
1xmrig-6.22...0M.cmd
windows7-x64
10xmrig-6.22...0M.cmd
windows10-2004-x64
10xmrig-6.22...1M.cmd
windows7-x64
10xmrig-6.22...1M.cmd
windows10-2004-x64
10xmrig-6.22...le.cmd
windows7-x64
10xmrig-6.22...le.cmd
windows10-2004-x64
10xmrig-6.22...le.cmd
windows7-x64
10xmrig-6.22...le.cmd
windows10-2004-x64
10xmrig-6.22...le.cmd
windows7-x64
10xmrig-6.22...le.cmd
windows10-2004-x64
10xmrig-6.22...rt.cmd
windows7-x64
10xmrig-6.22...rt.cmd
windows10-2004-x64
10xmrig-6.22...ig.exe
windows7-x64
10xmrig-6.22...ig.exe
windows10-2004-x64
10Analysis
-
max time kernel
170s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2024, 00:17
Behavioral task
behavioral1
Sample
xmrig-6.22.2/WinRing0x64.sys
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
xmrig-6.22.2/WinRing0x64.sys
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xmrig-6.22.2/benchmark_10M.cmd
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
xmrig-6.22.2/benchmark_10M.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
xmrig-6.22.2/benchmark_1M.cmd
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
xmrig-6.22.2/benchmark_1M.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
xmrig-6.22.2/pool_mine_example.cmd
Resource
win7-20241023-en
Behavioral task
behavioral8
Sample
xmrig-6.22.2/pool_mine_example.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
xmrig-6.22.2/rtm_ghostrider_example.cmd
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
xmrig-6.22.2/rtm_ghostrider_example.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
xmrig-6.22.2/solo_mine_example.cmd
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
xmrig-6.22.2/solo_mine_example.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
xmrig-6.22.2/start.cmd
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
xmrig-6.22.2/start.cmd
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
xmrig-6.22.2/xmrig.exe
Resource
win7-20241010-en
General
-
Target
xmrig-6.22.2/rtm_ghostrider_example.cmd
-
Size
1KB
-
MD5
3f0155abe745be1f6089eafc4f517ac8
-
SHA1
277f510ceb62b277b141d094c82eedebdc6f3a35
-
SHA256
810614290bdb14d2ddf10f65f8adc988a8272764f2a9e2c378e52fad162da344
-
SHA512
8def46852a962ff5dbed94e01f8d23019ef401a718d9c5a440d12b2ffa369539be328f165f68ccc2098cd5e5c939bcb5f784f877bdd7b9d939393bbd2229d19e
Malware Config
Signatures
-
Xmrig family
-
XMRig Miner payload 7 IoCs
resource yara_rule behavioral10/memory/3984-1-0x00007FF78DB40000-0x00007FF78E774000-memory.dmp xmrig behavioral10/memory/3984-2-0x00007FF78DB40000-0x00007FF78E774000-memory.dmp xmrig behavioral10/memory/3984-3-0x00007FF78DB40000-0x00007FF78E774000-memory.dmp xmrig behavioral10/memory/3984-4-0x00007FF78DB40000-0x00007FF78E774000-memory.dmp xmrig behavioral10/memory/3984-5-0x00007FF78DB40000-0x00007FF78E774000-memory.dmp xmrig behavioral10/memory/3984-6-0x00007FF78DB40000-0x00007FF78E774000-memory.dmp xmrig behavioral10/memory/3984-7-0x00007FF78DB40000-0x00007FF78E774000-memory.dmp xmrig -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133799051880222814" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 216 chrome.exe 216 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeLockMemoryPrivilege 3984 xmrig.exe Token: SeLockMemoryPrivilege 3984 xmrig.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe Token: SeShutdownPrivilege 216 chrome.exe Token: SeCreatePagefilePrivilege 216 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 3984 xmrig.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe 216 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1172 wrote to memory of 3984 1172 cmd.exe 84 PID 1172 wrote to memory of 3984 1172 cmd.exe 84 PID 216 wrote to memory of 4744 216 chrome.exe 110 PID 216 wrote to memory of 4744 216 chrome.exe 110 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 4348 216 chrome.exe 111 PID 216 wrote to memory of 1564 216 chrome.exe 112 PID 216 wrote to memory of 1564 216 chrome.exe 112 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113 PID 216 wrote to memory of 316 216 chrome.exe 113
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2\rtm_ghostrider_example.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\xmrig-6.22.2\xmrig.exexmrig.exe -a gr -o raptoreumemporium.com:3008 -u WALLET_ADDRESS -p x2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3984
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3168
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc4b7dcc40,0x7ffc4b7dcc4c,0x7ffc4b7dcc582⤵PID:4744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1756,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1752 /prefetch:22⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1988,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2444 /prefetch:32⤵PID:1564
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2568 /prefetch:82⤵PID:316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3352,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4580,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:3924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4884,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Program Files directory
PID:1488 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x284,0x288,0x28c,0x260,0x290,0x7ff61a594698,0x7ff61a5946a4,0x7ff61a5946b03⤵
- Drops file in Program Files directory
PID:2556
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4896,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4924 /prefetch:82⤵PID:3168
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4544,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5200,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4400 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5164,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5204,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:3884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4460,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5248 /prefetch:22⤵PID:1868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5324,i,1058777087033202431,6860338799367312889,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3844
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1500
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5086553ea69b5b72c95777be8c308bcd1
SHA11f9720cb97fcc76c72ad76be8983980fadf593fa
SHA256791e0391d3a0486f8539a86a985efa5fe0118f1de2db5252805c28849eb94de1
SHA512b5b9a66d70c15d6fc567d626532086589c78265eb3976c3ce7b744dde1cf484615272a5611906d001355a0572fb90ffec64c7528c1e98b949ca3fee5dcfa235b
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
216B
MD5996cec54b84ccc6cdd3cdddf01db45ff
SHA1f5f25fec2ef4b7beb581b35b85c3d0070b829dbb
SHA2569af57924f98920db392cee36bcf1bfe537ff0e79611b157e4f6b968343d58642
SHA512758dd4607598cfb3e9b6fcbc957f2e5630660a8efb961bf50f8a3733f9ad902586cf383a639f07ae6303a193d5283527dd88412ef48c5be3325b37f6af154fa2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD53867fe379268dc18f77b38a9093d297a
SHA1f80fdea2a83bec906cd02c9d90eec6eafcf482d1
SHA256e42dc96f031630b2f47ade96e99a8a3b3a3c53b80c5e9d636f4031c1d792f1a0
SHA512c8a88433e3771954f00f4819c99dc9553e1e3b2fbc8ea3b774e9345c6d14ac5fc75ff62350913a9b4e788fb9c431b5cb609ba29f9776693ac0c955c17534f8ac
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5ddaf99c58c63a5f512ea46bf8f0d5223
SHA14c6c0a78bcfef3f09088890d5de12b9c8f3492a3
SHA2561e599adfbfc031068fb608ceb01d0e8a8a7cc21c8eb4208e159f4e286a5945c4
SHA51266fa66e0faccb67c65f36497854df46b37130a2059cd175d82c41255339a0e8ba9c8dff691e31bfaf1450d4c95ff1a5f5831496a73eaaf182e0e23680594c26b
-
Filesize
356B
MD56d49dca24227f9c23176aad80fc6f2c8
SHA1bb91c20f03595774cebb227b7bf2d21653e5d939
SHA25648d931f110c16ee5aeefc78f4892ddb9a265698d82d9a372beda77edeaed5c19
SHA512ac3cc6729df46d49a6a99e25cc3259905dcf5556710cb06f4497a934553903c368913c77a0d4f75047d7f0ba0a4e9202739bac9f46f2bffd98e978a156331d63
-
Filesize
9KB
MD548874dd9898db26cd3de117e11a4888f
SHA1f1c7da4abb42f7fc30463c35a6b9906291f1e219
SHA256b6620ce68e5d3d47f9116df82bd261cae844593d5e18ced1f124cd9f847ff5b3
SHA5127978be86c2b0cdb6dc40db681e7d9fdd7e577fcdec1fbe35ada0ebf1bdd86e06b4c3f359b9b5a0982ace75f41e898d672ef333e2d7743d81bb64c187840b8ed7
-
Filesize
9KB
MD52164405f1b67a556811a87aab4e90730
SHA1c00ad04201121dea48259e4a5a4f3c5463d8ecfa
SHA256e9cb67b96cfca2090371e392b8514ef605650157e024bf358cc17896ab313d98
SHA5126cda5bea5ed898aa82d97cf3f138e4cecd2c71596469f11b96fc0ab5e612a8424bc014912cf263e32b1f2cad631738a9a4a8697850d089959ee91ed9332127a2
-
Filesize
9KB
MD5ef54eda29c67a644ce2b52851c0ab345
SHA1ef06d9f9cbf9daa0f8dcbc546be5c3725e876e2c
SHA2566c0ef679ac87edf63141bdc0ed79a2c577590b3a18f5d5d6d185d3879e7a5768
SHA512a70721474c723db279b70a3b1d64cb2c089b7eb3a7e085e828272b51a02465e9928eeb2a90d5bdda0cd4b778bbd4963cd0ffe72f50a06a52139506c094ee1c3c
-
Filesize
9KB
MD52059544cb4a305066f21237bad4cf966
SHA13840587dbb1ab0fb29da7fe713277b8df079c97f
SHA2568e920bc7beffab3120fba81d23cd0cbe92e0fe3663a614d6d314435d491e51ac
SHA512fc1e77ee1f494575e41de7e038cebe8ab0c687c040e3e96c13eaa93b9f2ea7c2d91892f00645b0dc7a308f2bece55f3cf99c12bbbaf6b6abb3e8a8a54a9b67d2
-
Filesize
9KB
MD567722880abc1019a2d91b44314c503a3
SHA13ed175b2730c87db1ca3221d974ad2c921be78b0
SHA256bf44f025982f2a94f23b7b4ef9129f77b096b90928bf82142e1b4f5e1006e6a2
SHA512f45426a480c31c214d048f8f7e4568d814cbc70c55f2eb384275cbcee29dc79f66f60ad1daad72b2cb3feb17365473b2074f23e0fff746a0ef71bab247e680c4
-
Filesize
15KB
MD58a7e165d235923847cad82422c24068d
SHA1d78237531cea38a9d109930db0e608d8ee46441e
SHA256c153a2035e3b0e9d2f39c2511391bea7d81fbe8594eddc7aadec774cc0964100
SHA512103624f2af307f68ae4b6bae695859ffa6b736b5e4bf666d450df6070e912e7fd5b022ddacf6334eb20458a541143c85b25e0229709b49154412a14d34d455cb
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5f26492cb83edb6e5c0698cc32e46dafe
SHA12c1d3b0a361ef542a43ff3f6161e8752baab95cd
SHA256ea64b5c64cd87b455486050d4e110e98678abdff24e0c529552529e8f24c2568
SHA5123b9a77493e5fa5e9a27828d2feb3872eb862e3933f79f53d4c3dafe6c5d765bbcf6200f3bd143407d80413df733cff4bfee7ebeeefd6462aee3500738430cd9f
-
Filesize
231KB
MD511ae668c7e16815a88f4a418ac83aa55
SHA117f40d9b970483a946973cfd50e2a3d53bb01915
SHA25619ffae436720a043d357c4c2fe793862dd2e27cfe38f0289b4b00bdaeaf3a7f5
SHA5125816ebbe8130a20e36ffdbecb7a9894abd3cfff84915165a6b89976aa290eb4ae70afa0593d6e707f3ea0b46ab80e3033133b9d2bbb7d40c2ff7f363ba9205fa
-
Filesize
231KB
MD5c3fd38e0889307967e9d0c28927494df
SHA1ee484b131b31dce20d75f99dd27d341349537f1a
SHA256b5b15e701e4d06cf8b75979b3ae1a7571cb88f5c614ba0f58e4f7eeeab6ad30b
SHA512f1b9bf31b66c394b60fccb3c2eefe8b3764d88577b10a5a4ae3ddcd29b1866cc9181d0cf7fa15739012f16561f5129b2c01f07bb041466b051bf4cf38d3e7a71
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727