Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2024, 17:17
Behavioral task
behavioral1
Sample
635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe
Resource
win7-20240903-en
General
-
Target
635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe
-
Size
1.4MB
-
MD5
64a1405e5f496aa528582fc5b29c6fd8
-
SHA1
56746562c4905a7fe30ff54d957909263c60a2e7
-
SHA256
635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a
-
SHA512
65ab078a44ed7b2ec6c8fa7530a5b5be17f0e6b77faf32b2413dcd6d4b2752977fe3fdb73946ae5390bb3b505408003a3c34c9ecd204c8d15df30ee5b75ea511
-
SSDEEP
24576:WLvpteBrVtMLwQe1Qog2SoWXaJSwXjrLAmPbHMvZZo/KDd:gvpm0MXdh8mPbHMvroyDd
Malware Config
Signatures
-
Socelars family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 iplogger.org 24 iplogger.org -
Drops file in Program Files directory 10 IoCs
description ioc Process File opened for modification C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\background.html 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\aes.js 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\background.js 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\mode-ecb.js 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\manifest.json 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\icon.png 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\content.js 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\jquery-3.3.1.min.js 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe File created C:\Program Files\aieoplapobidheellikiicjfpamacpfd\js\pad-nopadding.js 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 4132 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133800526614849284" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 456 chrome.exe 456 chrome.exe 456 chrome.exe 456 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeAssignPrimaryTokenPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeLockMemoryPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeIncreaseQuotaPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeMachineAccountPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeTcbPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeSecurityPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeTakeOwnershipPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeLoadDriverPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeSystemProfilePrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeSystemtimePrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeProfSingleProcessPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeIncBasePriorityPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeCreatePagefilePrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeCreatePermanentPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeBackupPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeRestorePrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeShutdownPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeDebugPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeAuditPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeSystemEnvironmentPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeChangeNotifyPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeRemoteShutdownPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeUndockPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeSyncAgentPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeEnableDelegationPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeManageVolumePrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeImpersonatePrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeCreateGlobalPrivilege 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: 31 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: 32 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: 33 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: 34 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: 35 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe Token: SeDebugPrivilege 4132 taskkill.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe Token: SeCreatePagefilePrivilege 2876 chrome.exe Token: SeShutdownPrivilege 2876 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe 2876 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1960 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe 82 PID 2864 wrote to memory of 1960 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe 82 PID 2864 wrote to memory of 1960 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe 82 PID 1960 wrote to memory of 4132 1960 cmd.exe 84 PID 1960 wrote to memory of 4132 1960 cmd.exe 84 PID 1960 wrote to memory of 4132 1960 cmd.exe 84 PID 2864 wrote to memory of 2876 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe 88 PID 2864 wrote to memory of 2876 2864 635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe 88 PID 2876 wrote to memory of 2080 2876 chrome.exe 89 PID 2876 wrote to memory of 2080 2876 chrome.exe 89 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 4408 2876 chrome.exe 90 PID 2876 wrote to memory of 2832 2876 chrome.exe 91 PID 2876 wrote to memory of 2832 2876 chrome.exe 91 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92 PID 2876 wrote to memory of 3440 2876 chrome.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe"C:\Users\Admin\AppData\Local\Temp\635caa9ab64a2cdbdd0a0797e5f206b223dacc9b2430d0c88539899bdfcee35a.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4132
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc773bcc40,0x7ffc773bcc4c,0x7ffc773bcc583⤵PID:2080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2000,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:23⤵PID:4408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1668,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2036 /prefetch:33⤵PID:2832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2292 /prefetch:83⤵PID:3440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3136,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3148 /prefetch:13⤵PID:1144
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:13⤵PID:4432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3820,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3860 /prefetch:23⤵PID:4560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3852,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4668 /prefetch:13⤵PID:4340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4980,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4988 /prefetch:83⤵PID:2284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5064 /prefetch:83⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5020,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5200 /prefetch:83⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4988,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5172 /prefetch:83⤵PID:4292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5160,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5356 /prefetch:83⤵PID:3092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5116,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5332 /prefetch:83⤵PID:2312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5200,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5424 /prefetch:23⤵PID:2432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=836,i,4508429628881197422,7416789134265289056,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5268 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4360
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
786B
MD59ffe618d587a0685d80e9f8bb7d89d39
SHA18e9cae42c911027aafae56f9b1a16eb8dd7a739c
SHA256a1064146f622fe68b94cd65a0e8f273b583449fbacfd6fd75fec1eaaf2ec8d6e
SHA512a4e1f53d1e3bf0ff6893f188a510c6b3da37b99b52ddd560d4c90226cb14de6c9e311ee0a93192b1a26db2d76382eb2350dc30ab9db7cbd9ca0a80a507ea1a12
-
Filesize
6KB
MD5c8d8c174df68910527edabe6b5278f06
SHA18ac53b3605fea693b59027b9b471202d150f266f
SHA2569434dd7008059a60d6d5ced8c8a63ab5cae407e7152da98ca4dda408510f08f5
SHA512d439e5124399d1901934319535b7156c0ca8d76b5aa4ddf1dd0b598d43582f6d23c16f96be74d3cd5fe764396da55ca51811d08695f356f12f7a8a71bcc7e45c
-
Filesize
13KB
MD54ff108e4584780dce15d610c142c3e62
SHA177e4519962e2f6a9fc93342137dbb31c33b76b04
SHA256fc7e184beeda61bf6427938a84560f52348976bb55e807b224eb53930e97ef6a
SHA512d6eee0fc02205a3422c16ad120cad8d871563d8fcd4bde924654eac5a37026726328f9a47240cf89ed6c9e93ba5f89c833e84e65eee7db2b4d7d1b4240deaef2
-
Filesize
19KB
MD5ebbf5a49fbad8743cc2eb003b68c388b
SHA1370d65b711c285845faa1008d7b0f173f37ab4e0
SHA256d711d82c3412f6d37927395fd950944ea34fcf076c081873ef834f851eea856c
SHA5120467b8f90104b03763e8efd1b324b4be21bdc428bd77933e2f60cb0cb7e3f1714a5794f6c2c7a9336ebec972285ca9fa552b1c99d6529dd9f407cb249f47ed82
-
Filesize
3KB
MD5f79618c53614380c5fdc545699afe890
SHA17804a4621cd9405b6def471f3ebedb07fb17e90a
SHA256f3f30c5c271f80b0a3a329b11d8e72eb404d0c0dc9c66fa162ca97ccaa1e963c
SHA512c4e0c4df6ac92351591859a7c4358b3dcd342e00051bf561e68e3fcc2c94fdd8d14bd0a042d88dca33f6c7e952938786378d804f56e84b4eab99e2a5fee96a4c
-
Filesize
84KB
MD5a09e13ee94d51c524b7e2a728c7d4039
SHA10dc32db4aa9c5f03f3b38c47d883dbd4fed13aae
SHA256160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
SHA512f8da8f95b6ed33542a88af19028e18ae3d9ce25350a06bfc3fbf433ed2b38fefa5e639cddfdac703fc6caa7f3313d974b92a3168276b3a016ceb28f27db0714a
-
Filesize
604B
MD523231681d1c6f85fa32e725d6d63b19b
SHA1f69315530b49ac743b0e012652a3a5efaed94f17
SHA25603164b1ac43853fecdbf988ce900016fb174cf65b03e41c0a9a7bf3a95e8c26a
SHA51236860113871707a08401f29ab2828545932e57a4ae99e727d8ca2a9f85518d3db3a4e5e4d46ac2b6ba09494fa9727c033d77c36c4bdc376ae048541222724bc2
-
Filesize
268B
MD50f26002ee3b4b4440e5949a969ea7503
SHA131fc518828fe4894e8077ec5686dce7b1ed281d7
SHA256282308ebc3702c44129438f8299839ca4d392a0a09fdf0737f08ef1e4aff937d
SHA5124290a1aee5601fcbf1eb2beec9b4924c30cd218e94ae099b87ba72c9a4fa077e39d218fc723b8465d259028a6961cc07c0cd6896aa2f67e83f833ca023a80b11
-
Filesize
1KB
MD56da6b303170ccfdca9d9e75abbfb59f3
SHA11a8070080f50a303f73eba253ba49c1e6d400df6
SHA25666f5620e3bfe4692b14f62baad60e3269327327565ff8b2438e98ce8ed021333
SHA512872957b63e8a0d10791877e5d204022c08c8e8101807d7ebe6fd537d812ad09e14d8555ccf53dc00525a22c02773aa45b8fa643c05247fb0ce6012382855a89a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\87ae25e2-c9e9-4ff6-be1f-571f99ed3092.tmp
Filesize16KB
MD5505b518335e55dd848d744b771f0c8a7
SHA1482c43d28113f3281de5c4065d627498bebfa17c
SHA25679b2f1c54a01f7639637a73fb1d720473fc26c5543081294ad5f3377aaaaced6
SHA5129a1f9606f764944947c6f4aa7f5c3239ce6eaa62183ee1c8e4b30e78f6d25bf156ee916b47d2a10d257c5b8dec1c72ec4b7527160cf0947957a75f444e4d8958
-
Filesize
649B
MD5fc855832982e507dc2da70a24b03ef0d
SHA10e7d266a3dffea64aeb2acdbfbd218dec3e8497f
SHA2567a072ade9e617e485d281f22520536ac161571ca54dc5dbc1d04ce4609a78a57
SHA51256d4177e9362482de1b05a21b34b2a8d015088e2f03304aa89f55a55661abeff608ccc558b3790b5adad5d58e2325ecebd3ffcbc26fcced12088134128c182b2
-
Filesize
168B
MD5bd841b573cde071b5754ff307f2e9580
SHA1dc5710907616cacf544c9793afc64134d02dcfdc
SHA256ecbceb19193a22e54acc3fade87d0e11f1455c0fd8854cc330750ec2d4bc71fc
SHA51297490895dfbd03f60187082533dacee3fbbf9930194424e2b0b6c3d4a5d3e5d7e71e307199f9b86f43f80fee859c2b703da2969808fd537c7d78a473947c053b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD50c001d6917168762e9a93db3910b7a38
SHA1d67dc345654f3265824bba5c136eee72fbe43f4b
SHA256f9c685cebe9a98785503b55548b146893d69040a4759febda0b5d6ad4a628b22
SHA51225bb409f37e4242792d19aeedf24dff59221a50b27b06d773c1796445650b29e5633260f70f176280f1b0726cae78726b008945ff47a7cd6c864efbde11e9c57
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
859B
MD589e738bf3d719c7a1f341f6cb7b300e7
SHA1c7305056062e3a9e19b082c886bb3bfc747b7959
SHA256037c65135825a0fca26a45ebbcbc976edf6d129095d45925c7b0098fc62514e5
SHA512de4b9cbacc9e345695b853131eb97496ad78e91d5a854ab8a5ba48299376737975305da1a6304c493814619837f47c07291b4eb77c2ec124ed9aa82e502f6b9a
-
Filesize
859B
MD5d5f021634d64d1bcda2056d5e3dfa5bb
SHA11752a8fa05114cb09da8b335f820d18d18debc85
SHA25651e5a4b6fe6c2db88fad4a7aa58d281190c3dec8061ab250d16fbc421a823e01
SHA512625677e5207602481e2f6fbe1acf2e6d2c60e1ec34dbf5a356ecef07e056567321b714f1d74be17ea7a017d89eaae654bb87fab592d45f76909408ca342a02fd
-
Filesize
855B
MD5b18f30200c222890f58a3dd15453d0d9
SHA1cb920e398637eac74f4bad2ecf2f6cccf5f82ab4
SHA25603f09ee793045ff12e4bcc6a9dcd52ba91670a1f70dfc431388f3e6b657fa72a
SHA512b540dda4698c02a80bb6fed6679b028dfcaa43033329264dc61bf1fa28320b6b359f9d09687c75bf982ece6d1731cd7bb390fe797d2e0169056f9e116b2f95a0
-
Filesize
859B
MD56e6322881ba17de543c577150cc1a190
SHA10ea60da2d986d8729d41230a1a864ec22527d9a4
SHA256dab4ea4c753b51a901be9cee9292736e0ed70ea40c2fd6bfdec5792d8f98a587
SHA5126b4c02f6db6caef90b280da6ac580a2988105d4ff392682edf3c632da7096612e3a8bbe6354f6760f7863935acf93030eb419a069529d69e5c2b10b10b141ef0
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
9KB
MD51e7f7d15211291ce8d1ba80b6c9a0a17
SHA122827df3aa4ad5d72d20cc38342df3e0f240cbb9
SHA256c4936fb3f4413a2111dbe52ba0c9a0b6166caea4721a5177109a16063aee4b99
SHA5121c81f52ae56d7e1028faec3be4ba72c7a47a9d963795065797fd03f43ea5c07c1dd04fa4e8db20f52a0a618b8f20e58dd7cc3395230ecca18e9c884c797668bc
-
Filesize
9KB
MD56e0acf6fdb3894af6ef01481b98ac4c1
SHA18a78438579359c2ce0fdf71e456ca7750cc7bb8d
SHA256302f1606766fe0ce1c816f59a99bbedf06768a4d639edda4f3c038c6a5745071
SHA5129587fc7fdc55176ae8f80ec15af8f837c690d2035bab50fb3eff83612f4231aa49519b56fdab811b3cc7bd230c1ae5a812746c420a62223d897df76fcff12d93
-
Filesize
9KB
MD5593d4745839335e8794f26ad79f9c3c6
SHA15afc763885275ac1940d969dce8e4c76c328124c
SHA256843b860c0dcf4d4b7127bc189ec03e4efa282a4482554e7a3386635e1573cbdc
SHA512918ec571d6a1dacac82c47dd16cfb98cb0a90eb79024c7567fbbe7941b9f46099036a1c017ad35ce9a128988d54f5e334360dd3bc97072cf86ab784f38161bac
-
Filesize
9KB
MD53f38af3a4219e9404bdafb6f3b3f4225
SHA1ac09be5b669ac588910bc84d804bb26b14c77a6c
SHA256ca8e693005e56d3714cb912fc542120c4a373cbfa98b058213694915afd8ef07
SHA5127eadb2338317a018b621749150476aa7f47943bbc4fdd6753e888f545115af9c8e6946e9405e11f1a0bf91124b37f21fefa6c3a4508376cbb471c827b10cf6bb
-
Filesize
16KB
MD5fca814542b1802d55979b0fa70725e00
SHA17bf137b7491474435878574c9ee1f137beed59e7
SHA2566368aa442cce4bb3af4a217bb09d4bce98e06d8e4ac0c47f2b5410c76b9c7820
SHA512f01db173649fbff7a4bf6b5e9d7bf4f3ec4cd3b76af020173afe677a75e296becf50fb1761fd5d82894e18ff8ee58225af25f60ccdc962cf7f7461cf49292ab4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5b9d6739bceb9e94b77582e7c3c5c7b45
SHA122e60be0714ef5efa85064b21e8a584091a7e8fe
SHA2563f5ca8694a55a77069b02d218b120c3881bc59be3020d960a4f632409b573d53
SHA512e5e851c390c03a77292642225892da98ef74dc11921b754500cdf4ebfb81355c8b68b4dd09c927100cb1c73f133de93020325d671b14e078407b5672994202a3
-
Filesize
231KB
MD5944d6373d72638ddfc8d48234178d530
SHA176770569b42a5014f7907d30aac8e7ff4ebb5edb
SHA2564bc973343208bfbc32615deb35f6243cfbc201f37d840f403d2a57c5b5945149
SHA512fd0d8b1e7ab1fa62aebb35b1b186bc50ef9cf33d3015c54d45be8802865bf6531c721ac16bc193eed26d1b06da0d1b938c8f71bc964ea6c824fd5b259dcbeddd
-
Filesize
231KB
MD5b896b001c4794ed25b78b2df487ca1f9
SHA1f426f773e3ba93b9c8a3be83067293bbf381554e
SHA256fe8d4676f3dc1a8fb27c7525b31185e2bfe2e7d925fd68166ea8a26d60b0894f
SHA512bc4b49568d1aed5cb0883d758c605322f9aca28a5885df2f71d8c6a527c1e70d507baef7a8ca3143029565253f5f839af2d883e9a3ebfd43371dc45c963a73e0
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2876_1753717170\f6de3cb3-acda-4247-a55b-86eb021e46b2.tmp
Filesize150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c