Analysis
-
max time kernel
713s -
max time network
709s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
06-01-2025 15:39
Static task
static1
Behavioral task
behavioral1
Sample
2.3_Archive_2.3..zip
Resource
win10v2004-20241007-en
General
-
Target
2.3_Archive_2.3..zip
-
Size
44.7MB
-
MD5
0eb58a649db2fb6e3d0b6e74909fc39c
-
SHA1
e213b8dd944952e83a1f3cec1b8258a3cd4a6d9c
-
SHA256
dd58b9ee5c5437df7d8178272198703854f30cf6c33af260941f78b9550cda1f
-
SHA512
c7e96bbcd856c44d9a63580ac4d77052d51cb284f9d192d4b199ad562baa879505aa921a36caadd70d68a82df19ccbcabbddc1d7dd008faeb6d53efe5572f1c3
-
SSDEEP
786432:Bmn/DnSue4djrzThFmv4Dh0XhyMUqY8Hbgl3WiuxDTTnnbUjK9YnOpX4oR:Bm/bDecrzThooh0XhyMUqY8HJiuxD3+2
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 3460 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 3460 setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3460 set thread context of 1708 3460 setup.exe 83 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\SystemTemp setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\metadata setup.exe File opened for modification C:\Windows\SystemTemp\Crashpad\settings.dat setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133806522475553776" chrome.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 852 chrome.exe 852 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1120 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1120 7zFM.exe Token: 35 1120 7zFM.exe Token: SeSecurityPrivilege 1120 7zFM.exe Token: SeSecurityPrivilege 1120 7zFM.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe Token: SeShutdownPrivilege 852 chrome.exe Token: SeCreatePagefilePrivilege 852 chrome.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 1120 7zFM.exe 1120 7zFM.exe 1120 7zFM.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe 852 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4844 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 3460 wrote to memory of 1708 3460 setup.exe 83 PID 852 wrote to memory of 2396 852 chrome.exe 86 PID 852 wrote to memory of 2396 852 chrome.exe 86 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4908 852 chrome.exe 87 PID 852 wrote to memory of 4052 852 chrome.exe 88 PID 852 wrote to memory of 4052 852 chrome.exe 88 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89 PID 852 wrote to memory of 3252 852 chrome.exe 89
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\2.3_Archive_2.3..zip"1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1120
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4844
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff925f9cc40,0x7ff925f9cc4c,0x7ff925f9cc582⤵PID:2396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:4908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2128 /prefetch:32⤵PID:4052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2180,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2216 /prefetch:82⤵PID:3252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3672,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4452 /prefetch:12⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4728,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Windows directory
PID:2736 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff610174698,0x7ff6101746a4,0x7ff6101746b03⤵
- Drops file in Windows directory
PID:3376
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4956,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:4464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4768,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4708,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4980,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:2860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5168,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5160 /prefetch:82⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5420,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5456 /prefetch:22⤵PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4804,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4400,i,6363446648143344897,5153823560633709104,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4348 /prefetch:12⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3292
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc1⤵PID:5096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5388f7c7e7fbd7983a69c4ac320cb22a1
SHA1846ee58d7a84e61e6824ae713c87513f10c243ac
SHA256abbf142c92b1a022e7109c6a3e52aad966fd95560e6c3a79ce3b457e55536a05
SHA5122a81a5387b5aeb22b0b54e716292ea6c5a086f0bf1aee90aa4682852ca957924be88add4206f7ffda01f215b432159e53b467919ca6d98f9f4f0258ec285689b
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
192B
MD568c225fa8392e942a2a0db8eae1c4f58
SHA138ddeb805095877d6ec59516d9a30906dc86815c
SHA25696223f37b73f4eafd7c6ed6ccc55a503c58c3f120abfd191720ef89be8e893db
SHA51241371a10c2a04b03b5cf4e1954eb3bc9bbae9f4c5465157cc7609f27b1e4dee505fdee08f775a58d6c0f7f09bf82b120e3b0cb3645215c5fc1b1484ce3678f83
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD5bd7c470cb7bc972fd0d0c52de1236635
SHA19ebce1bed0ecf331184989d3ebcac8de35484e50
SHA25616ee54736843dd4b1188ed9c6d5c798f216051f6261c045f2b5a0ed12b24a0d6
SHA512644524d509f866a79a89415ec08c82e3a3e2913ca75a27f0c30c0ea93c20bdaedac6bf777a1b0919ebd213488136472c1d495dfca325df4edcb9470acb1054fc
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD543658faf74cf273af935f72942ed3c5b
SHA1c9ea1d48ef9f60a9a9686dcf5c749abc15166c5b
SHA256a3cd1f34d97654f69ebf85f67443ed5848601c7178b610101100caffb08fdc06
SHA512e779a27e4cfe393c793a7620e9bf451b19b4812b2221d248b6cf83d647e0475f029a4b7d52ccc5deb943afb81b15bc71f059c55fdf35278dd2771fa113aad78b
-
Filesize
10KB
MD5807098dd19014d12732df2b102a806f3
SHA1634aba708cf9ab2f5e4e11c11a598ff31d7868a7
SHA256e84c6866577e8bffd27421075829a258458d0e9b114c27dda9732e42532fefe4
SHA5128add9e6212828ce81737c20df01dd6d54a8d0e524f0ce492fbbe4b49de7d8df5885d68aa9cc69b7dc5df346283da388ca2718eb383a6c93a4cc7079077ba1534
-
Filesize
10KB
MD5809da9c724de96e4ed2da696fe30012c
SHA1b8275325e1ecec110807e7170cd14fa09f2cbb0f
SHA2568b7ac4b0735345f01aaf586e59315e2a0958434f607c840ca7ead9bf08179a32
SHA5124ce3d5166e76828920d81bfc4dd5b1b7c4d28d6beb8a6dbb1481f6e2446daf91bfb9c7ab2bdf510be38d4889fd87f5841974314b3a5128dafa23bd4462fe92f5
-
Filesize
10KB
MD52f72c45e3c407a5769b359bc8b7eaf1d
SHA1755e34976e20c75f4ca8b968d720011a0386ba6f
SHA256018bbeb7f5cd74fb7c040b633c4e208ae56cf88c70b4e69559c4a91d65c8f312
SHA5124db8637bcbe17fe293e1a9a7652f5ca0bcac365ce9057706da0da785ab651035d7013949e62d3f6b171d7377d0d723aeefc8bbc3a3171b42a1a4430a8f1e06db
-
Filesize
10KB
MD57eacd30f0b5ad77e866dd50aef2a2443
SHA1a3e12bfc75c32bece18451a44e1dff56c16fff80
SHA25633ec1edfe6e849f23924d87b6dac326c19133d21d6b46df53cbaffc3f6fdcbf5
SHA51223de67c6bae206d17a92b33fd450936ecb5e00f51640bfd852cf9ba391dbd8f9dc6114adc266237d91dbdee146ec51706dfe13898b9007e554a3c90583836015
-
Filesize
9KB
MD5626366f97c78d6c01315463addc94e69
SHA133e1d3c7b6c1c152a79da7315d8d8cb09034713b
SHA256bd4570173b006ec6db67df1a22c7e19c8c6007d2cd6634e4ecfeb51a3c26f0a2
SHA51209e060ecd73f92aa6ca88bd0b94175196cd4c4392923caacc25969f461ac70af72080d2661760b8ce99a7c9b10e90bd89995610ef3a0535fee9989b305921867
-
Filesize
10KB
MD51fc525b84aca78c2f210f05b9599e133
SHA12f9d1cb30cfd9a9fe573e6aef6ebe780ce4cd4af
SHA25617ab1c01cc1775ef58df3c296b13e502a79584a8fd9911c40d16c67e23a4c765
SHA51239b366cdba142a02ed0dcac92ac949e8590d4bdfde13c67f05c475538c19faa42f2445a85eaa2f438650017183cfeda95b87929497431f2f506582a2fc2dbd8d
-
Filesize
10KB
MD58c26e9d45dc25b41cdb02d285883ad2e
SHA18b762b2a12f6a4ae4fcb121ef5f12e558bd7f799
SHA256e21d4d2efacfa493a601b23ed52fce72eac06b461306b7cb3268b40b58d8601e
SHA512b4fdeb87a56c6d6ad394dc939641d2890710caf4cfdef5cfa6f91e9656f62763ab24b7c4df0ce0ce4f0e54b1cdaf519fb420378a3de9864c1e0006d6159f0372
-
Filesize
15KB
MD5ccc63b28f7f1714261dacbffb4c2d1d2
SHA17852c4a27adb6eb4606e0004de421b9b43b8c974
SHA2569d7cbd871de8d77f9c15f720d656899b07bff24655a7c23e4f76d75eea4b76f8
SHA512f0a13dca48eba69e54ad85f0fbe0e0779120710c18ceddaf7dd02beefcbc4fe142a9d66fd861aa2deb67c1547bd82b7e913b11a2b00fb9246e22d3419d788357
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5c7ae50a4115f4c708955ff462cd10224
SHA1025d2336ae1e8900661f3611e84d93ccc9e3a72a
SHA2561bd2e1e65affb7a4a76b3c26861624071c2f57fdd731896658d976e3c2a14fc8
SHA512ccd2c83a2d5bbd7d44477bb797ad770e5b8d249b7f309db9038c39134b9614154efa2803d493c845f6b8672625adc529080e644dae4b50b492eeb33713e716c9
-
Filesize
231KB
MD5f7542368a1008bf4f7c1442040c0044c
SHA166f1dbeffbde22dcd3945d75f4e77648aa2f5990
SHA256fc0fc7f845824efc37ab0d8c22b44ce3c646327d11c8b850a40d4e2dc62d1cf2
SHA51210ded72a438094fe539b52639eea01110a73c9aa2a757b3f96fb85724d76759e7a8aeaaaff4f1b447d57a30510d0f8eab9fc18814f30670831f26a525990cd40
-
Filesize
231KB
MD55b169844ba77f52fc39624b67c760215
SHA1dc382e49cb0e3f5386a62879d91bb93dd26304ea
SHA256893ecaeaa127d76494dd3345914cb42f73d7608eb00559f569858af63f15979f
SHA512d827b637a6473a13404eb124c67b70e99a573a89dd6a3d53ffd88080f618ef141c2b5b55757cbd1c0f1477f9364d239c34743b5bff1416bccd5999d846b7d7b2
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
491KB
MD54adce8122174f19a12d65979b14d8e60
SHA120499a2f184407f1a790b3b4fb80b05aa63c2c69
SHA2560d4c259791d63fddd69c4883abb54dc46d34427ab3ceefd3500fb09b6fc8454b
SHA512c5a10705e2394be77cf2345e1d507f367af4f5a19e54b00c8430d78240721caefcb0aeab8b1b3137f37d2c791e3b34d3eca440f4567449320c553dc9e1385718
-
Filesize
430KB
MD5d62dad7d19fa7be1aaa151ee5a1e9b83
SHA11b59d61def48900bf840922f139449528ef3ef79
SHA25690a567ce30976ece0c2f23d3169dde71d21dc64b9f330e94ea1caf0e63447614
SHA512eba8a042f3278c9a57f6460f1b7f041bd91f6e68917d937679d137d4d332cd0d7748e502976d65af2c3c4b3d4cd13a50ee512b79002bdcd040c0e2f374468034