Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 14:21
Static task
static1
Behavioral task
behavioral1
Sample
Urget Contract Action.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
Urget Contract Action.eml
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Urgent Contract Action.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
email-html-2.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
email-plain-1.txt
Resource
win10v2004-20241007-en
General
-
Target
Urget Contract Action.zip
-
Size
424KB
-
MD5
607104ec5c797bd46a0a6bc76bfac512
-
SHA1
d6c5562c2c63c5d164cf09ab8c829cf8d4ed1581
-
SHA256
137cfbc6611add95e7dd00247098efc9aa4b16771d62c20a5d149f2181da6d6c
-
SHA512
0fdd49b6939bcf281a2cbcd50ab53989864a498e37dbf0d55ebc8f2e1ec3ee14c41ec52c8828d99f1ca612d95a53f22d2c76c0d8aa219740f00a736d9573b0b2
-
SSDEEP
12288:ZUpblYhNXCaq0DXHyLoo4Re+Bo3KhiJeHMgV+awgp:ZUpblYDXZDXKFJ+BOKSi+5G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133809061703899809" chrome.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 3a001f44471a0359723fa74489c55595fe6b30ee260001002600efbe100000006464ae769918db01fe36c47fa218db01c6650e17a262db0114000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\NodeSlot = "2" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Mode = "1" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\LogicalViewMode = "3" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupView = "0" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByDirection = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 = 3a002e803accbfb42cdb4c42b0297fe99a87c641260001002600efbe11000000b8c5b0769918db0130421cd7a162db016d84acdba162db0114000000 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3} chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\IconSize = "48" chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = 00000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0\MRUListEx = ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = ffffffff chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\FFlags = "1092616257" chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 chrome.exe Set value (int) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{CD0FC69B-71E2-46E5-9690-5BCD9F57AAB3}\GroupByKey:PID = "0" chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff chrome.exe Set value (data) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\0 chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell chrome.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\SniffedFolderType = "Generic" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 856 chrome.exe 856 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3888 7zFM.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3888 7zFM.exe Token: 35 3888 7zFM.exe Token: SeSecurityPrivilege 3888 7zFM.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe Token: SeCreatePagefilePrivilege 856 chrome.exe Token: SeShutdownPrivilege 856 chrome.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 3888 7zFM.exe 3888 7zFM.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe 856 chrome.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 548 OpenWith.exe 3012 chrome.exe 3012 chrome.exe 3012 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 2884 856 chrome.exe 108 PID 856 wrote to memory of 2884 856 chrome.exe 108 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3064 856 chrome.exe 109 PID 856 wrote to memory of 3736 856 chrome.exe 110 PID 856 wrote to memory of 3736 856 chrome.exe 110 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111 PID 856 wrote to memory of 5096 856 chrome.exe 111
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Urget Contract Action.zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3888
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe017ccc40,0x7ffe017ccc4c,0x7ffe017ccc582⤵PID:2884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1820,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1816 /prefetch:22⤵PID:3064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2184,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2232 /prefetch:32⤵PID:3736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2288,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2484 /prefetch:82⤵PID:5096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:12⤵PID:3548
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4816,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:2500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5052,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:3732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5112,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4148,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:4672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5204,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4696 /prefetch:82⤵PID:3944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5108,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4716 /prefetch:82⤵PID:748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4900,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5096 /prefetch:22⤵PID:3524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5764,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:3104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5552,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4528,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4560 /prefetch:12⤵PID:3460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3400,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5596 /prefetch:82⤵PID:1508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=3264,i,3245455391328612002,14704981146088380715,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=864 /prefetch:82⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1584
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD50a01ed1f98de4dd0e79e37c707a98289
SHA1eb3538fbd61c597c52be436c38bebb5079c0eedd
SHA256b08d505cd77064d13230fa33efa827388ed16632f70381aa6058370b1b3c446a
SHA5122ab281080946525ca077228b7ed225208ca8b93a2dc470d2d708fe1019ea1c4e0e682d020062feda78241ef8f460adfc7828f3da6b078275fbfb8ddddc82d18e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\7c94a21d-6345-4327-83ad-50b3399074d1.tmp
Filesize9KB
MD578f73cf675cbdec3ebf3bc45c5a1e322
SHA11cd8ed29fe4f3b9c35f3b7ee0d0e24c360a4c8ab
SHA256a98b51921ea19c700d304285f3ee6d8023815e5c4b13a9dfcb6f44e0e4ae6753
SHA51265897647aef1e7092579a85a06c234aa2bd2c765a736a9e53510e65d4e34ec43a25aacced0bfb3e53c91a4a341573f54dee5943cc71b80c63c75caeddc1fd053
-
Filesize
649B
MD59ef886255450ab63cbfa41c73005b26d
SHA1e31945cde581e43e84a15d6cd920f6f1518b5bc9
SHA2560d5cedb15020acc91fa66f94045261219c96c00f3f5ea654c299a2793622c453
SHA512418d0d01ad9d1888fa12674aff87f801841cdf30cb8d060d53f8703abe38710b9acef4a17edad966237f4d42ae5184bf0ba4bc754ccd47244d9e7afbe2c67242
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
41KB
MD5ca9e4686e278b752e1dec522d6830b1f
SHA11129a37b84ee4708492f51323c90804bb0dfed64
SHA256b36086821f07e11041fc44b05d2cafe3fb756633e72b07da453c28bd4735ed26
SHA512600e5d6e1df68423976b1dcfa99e56cb8b8f5cd008d52482fefb086546256a9822025d75f5b286996b19ee1c7cd254f476abf4de0cf8c6205d9f7d5e49b80671
-
Filesize
216B
MD546d1fe2f938ca3ed5a4afb9a728c5461
SHA13ee9297b48b9d6e80d8618d64df30dc75c631f3e
SHA256ff91c57085f64e31ab7f59b750b46808be5fdcf7199eeba94f004f4289d0a168
SHA512cea2f99674a0f9c7b63542bac26aee984b228f3c8786d54f6464306fe47c819c995e9f8d5608204042dac4a440ff8ff93db14f0b4234e90832e43032ba92a9c9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
6KB
MD5f31fdf057fe6b39f5888df556947e689
SHA1b78b1824347161b49889f0868ea987e7f39a8264
SHA2564fdd091ef98c7a0199d6e4b5c47d8a31bbdfe7652a0a9b46689b5f19f8fcb87c
SHA51259118c9bba989bb3e1a65018e4e9a38c91cfd23ea9c5538740d85a7c3aaffa55f68e5caabe0ccb6b5650a4e89b269f54ce1d951ebacdd6f85ab79e6133588813
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
858B
MD539fc8e2312e4c0c13cee10712bd4f7a8
SHA1f41d048b134a171ab68909f3ad743f13fc29956d
SHA25697e68c40ec2ad7ead596c2c2064d3357c4b7fa09f7acba40af79756252bd5ab0
SHA512062e0041a810fe02fdab2a803bbd1bd7a6ce0b77252d001a000dde995e24bae9c4076785de01ccb803efecb95bb5eda7eb4e86a73568a2c415c42a44de2e5545
-
Filesize
356B
MD59f604ee8ec538b71df9d4abffb809684
SHA1fc2bed18545ba2f1929f89449a5cef3bcc475ab9
SHA2563797f5fe942075c327e5e0812f98f66e72c122afcef9f0dc13ead91526de76b8
SHA51223eae58445641badd0a642e6bf45862f50e1841e26c0c07ec09adc462221507dc2ad54f12160cfb40e8b6cb0978919b5ea71633b2d8412261756f77569ef1f46
-
Filesize
10KB
MD5ddd8555484f97e086336ee5923d869ed
SHA17e968527c7fcad629e1c40a0a0055e3dfd29f304
SHA256b0a8fe5978f616d66615030b86d05443fa5d601f61e1e3a0a213f43f84b36103
SHA512fef0d2dc2d2aaf8cd5ac852b284fdaee2ba8ac5b1afa181954e6321071f6e6ce200c5c46800c4bcbabc35c707b2166810040acbc6336cd4aa37dbcd8c81513b7
-
Filesize
9KB
MD5ca4a205e251baa579b1d867bdbdfb908
SHA1aca61a77da7907b4d35b121961dd529ce32d5547
SHA256cad17607881459a9aed269fa1451684b9e3a1d5535679b24b57957120434eca7
SHA512768e7e4370ba3b78383e4d169756705983d61afcba3371b98c081c5311f918ef1080c6e3b545bde67d636013b5400de36939c5d64142e7b46a19a74f2b7ad6c4
-
Filesize
9KB
MD5daba4054f716f6f16ec56b80c149b956
SHA143bd13ecded02e3f6ed75b5a648a808f40c2fc63
SHA256db0c8bcae22ab08b7afab83af34733f8aff4b191c8fdf1c979dd1f97313a6d52
SHA51256fbaba09fffdf5b981f10a68183522d1369620c1c7e8cfe274e4635a7c4c80ef6858b6b880d2d05f5188533124b692fcaf9a235b57a0c37448292dc61858a4d
-
Filesize
9KB
MD5ad7dba6b69feaed28c6f67d5e057cbe1
SHA1ba07d3948f31f5ba618d6d8ad3e13d184152c4ca
SHA256ddae42f8f8e2286fbae698d67d1195ea122d70147bceca9d4335e805cf485799
SHA51271d015ccf684a7a1b587e56cd82a477ec8f7bb7307f45f802c47dd1868019f8b34436457c03292b80a65b11cc8abb7771ea04c51c378daf97814e5be87e0d80c
-
Filesize
15KB
MD561bf952c302f1ca7fafb36d089ddd83b
SHA1246de90ddd10750f6c704ea61dc30c36ce96c78f
SHA2567b78e938116129b64045f02d0a82e74573c751d4d8cd7fd10fd1e7d761bf9986
SHA512a175dea4b73ca65d5017dbe2693b89f260a0697f7b809314e35e395240c2176ca04f49af509ca95c8b6a93ca2b354ca2840469c229cb85da2da373e492307673
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\temp-index
Filesize72B
MD5bbdd733781e4b4c4f1475d455a778605
SHA191e43d66c9559d12360d0aba0611031a8238f93d
SHA2560033b9059f6cb79847bce294c383d9512e997a3758d17a8822d646a913902585
SHA51206a46dfe2744a1a3b24e809856af05b51d8a4b6f5600d1496b5fe62da8031cd6968a4482835e767ec430a281b9a6a5a62942beacd4e988a642398260554cd9bc
-
Filesize
229KB
MD562de9babc4bd4f49bc8fc0f6b9994614
SHA12b426c9a559e6211534b0ed90b7029027561ab36
SHA256826d2fc6a6e416143b99e2ee63bde1e5d81c7cb16e2e77e2541e13582a9ab49a
SHA51202b45f34b5a501308f75c73958fa3713cd98ea9f3fb094ee57fce032fd4eba14932daa5ffee169eae4bd7544082c37e9518f12e522b7545f71f296d1b7dab849
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727