Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/01/2025, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
HorionInjector.exe
Resource
win11-20241007-en
General
-
Target
HorionInjector.exe
-
Size
147KB
-
MD5
6b5b6e625de774e5c285712b7c4a0da7
-
SHA1
317099aef530afbe3a0c5d6a2743d51e04805267
-
SHA256
2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
-
SHA512
104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
SSDEEP
3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133812177936135061" chrome.exe -
Modifies registry class 21 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \Registry\User\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\NotificationData explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 628 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe 5256 HorionInjector.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 5256 HorionInjector.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe Token: SeCreatePagefilePrivilege 5296 chrome.exe Token: SeShutdownPrivilege 5296 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe 5296 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 628 explorer.exe 628 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5256 wrote to memory of 2808 5256 HorionInjector.exe 77 PID 5256 wrote to memory of 2808 5256 HorionInjector.exe 77 PID 5296 wrote to memory of 2000 5296 chrome.exe 90 PID 5296 wrote to memory of 2000 5296 chrome.exe 90 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 3348 5296 chrome.exe 91 PID 5296 wrote to memory of 4212 5296 chrome.exe 92 PID 5296 wrote to memory of 4212 5296 chrome.exe 92 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93 PID 5296 wrote to memory of 4916 5296 chrome.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5256 -
C:\Windows\explorer.exeexplorer.exe shell:appsFolder\Microsoft.MinecraftUWP_8wekyb3d8bbwe!App2⤵PID:2808
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:628
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4712
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd227acc40,0x7ffd227acc4c,0x7ffd227acc582⤵PID:2000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1872,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1824 /prefetch:22⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1896,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:32⤵PID:4212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2204,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2216 /prefetch:82⤵PID:4916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3104,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:12⤵PID:2952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3364,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:5716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4448,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4752,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4748 /prefetch:82⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4836,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:3324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4976,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4984 /prefetch:82⤵PID:2340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4776,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4968 /prefetch:82⤵PID:3084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4780,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5088 /prefetch:82⤵PID:5592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4600,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4972 /prefetch:82⤵PID:4336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5476,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5464 /prefetch:22⤵PID:4044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4972,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4928,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4280 /prefetch:12⤵PID:5204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=4720,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5576,i,10129587111245679368,2946138265084948508,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1568
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57e5c2a56978f2de14dd2cfacaa86e6eb
SHA105e6286c12837443f31ecaed081db3f49936135b
SHA256c369a75374147e71b83f2acd1c9991f44aaf86498f1a49a2b9cfcbd38129c5d7
SHA512ec8c6dbeb59107556a989a7708c3630fc5acb07d7e16ad1ff81345c1c5c4bfd24175e8f7f2493e90ad245af5632bd6280ba8e737d53679edae6b655515c70de8
-
Filesize
215KB
MD5d79b35ccf8e6af6714eb612714349097
SHA1eb3ccc9ed29830df42f3fd129951cb8b791aaf98
SHA256c8459799169b81fdab64d028a9ebb058ea2d0ad5feb33a11f6a45a54a5ccc365
SHA512f4be1c1e192a700139d7cff5059af81c0234ed5f032796036a1a4879b032ce4eedd16a121bbf776f17bc84a0012846f467ad48b46db4008841c25b779c7d8f5a
-
Filesize
41KB
MD5ca9e4686e278b752e1dec522d6830b1f
SHA11129a37b84ee4708492f51323c90804bb0dfed64
SHA256b36086821f07e11041fc44b05d2cafe3fb756633e72b07da453c28bd4735ed26
SHA512600e5d6e1df68423976b1dcfa99e56cb8b8f5cd008d52482fefb086546256a9822025d75f5b286996b19ee1c7cd254f476abf4de0cf8c6205d9f7d5e49b80671
-
Filesize
216B
MD534869a7b402552242e8e1d2018634a07
SHA1809ef0a99e367e36f933311986794828903d341d
SHA256dbc08b58a5ecd305d11c9ca9587475efecd50d74770bbfd5fb236bc34aa6c0e3
SHA51251a1d9f9926f8965c43f6f3208ed3061dfafe80a0b05ac5abc71be416757cbaf4bd8664e57c049cbe46022f0251475f70de2731a848818098e338d4a5baed86b
-
Filesize
1KB
MD5c1ce638b92d7ccf94f3ff5b6957be1fe
SHA1f4b2310087d853fc6805281acdfb86f1dcd8e962
SHA256ffbb5cfabb3346377fd60c204f825395d673d53bf880c6565b873d489b896737
SHA512cead0237aca7fc2828bb267999763c1bd0429287ed7dda861875e0b6fbb29940ac5e3cf0711ae500f5c7dc03c8c35a965af4643d09fde7c279af6658dc9effd5
-
Filesize
216B
MD5e11465b0ad8b154c335966f9bb508068
SHA16a045a28092dce1cc40ba3257c58863cb52d6c00
SHA25653d486cf2691db81b27202dd0b12dbc0d23172867b3af508c8caa69fa48002db
SHA512e9aeaeec584f1f8c04f7132a136f05caff587cd7b91ae32928ac264a638d57295473cb16a571bec9bb903b4097afd2aa2e01a5d523a281e2f3f51468bd9ab3da
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD5d4b38ab0eb11c149baa6c3171b7b83fc
SHA1785efdec019068e00a6945ecccf6220eafee0ddc
SHA256935ead9f01eff7ef0452e78c37650ad42c99d44ecb51444967adff0727a50ebb
SHA512c0b2c004bd30cc5960d3e0d6388acdc3d1d59c5cb5cf602d4de902789b22b1ad53247149069926ffe757d918a747847fe69d2cffbf34eb34b453c02ebf5d37fe
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
860B
MD5623fa46424e362724c56cd426cdd5434
SHA19be8f412f32c7738612adf78e4831a8a3273e034
SHA2566585b38cdf201c54f0d738789a0504df95c7afc84642a8214a3dd239146973bf
SHA512b5a9ff0017ddea13e7a5e89af8dd1c99e8998f0a9283a6018953378c11fdb6fc19d487aa17c8e4b964a90ab7fa1a612eb9327e071fe2dd8370d2ac3a9f9c9265
-
Filesize
356B
MD5e3086cf97ad2d7c56b99b591f7d5922c
SHA17d33a8bccb08796810d0a324be8c12c6e8b2b5b1
SHA256206862221c4b59f9fa26dbb90da36cee1c7203487919b4ccb1a19ec868c6f6d5
SHA5124a07b83966216a6ecd35d7d4fae21910d4d61f01ec741b32665175c6c7d591f7a62d65193c46a5a6043b3865427ed907315ba6204a44f469bed1adc8812be24c
-
Filesize
692B
MD54d0605c9b6252ddabc2171b95e3610b3
SHA10af2066875378833a13362fc01d0497f02920bc9
SHA2568973fb2f4318bdae71ced8721e093031e09fecbda701ef6409ed16ebab422551
SHA512f0bef851f0a4467bf80cb888c2d786edfc987d02d5ffe52e0281ac36bbb8fd0c989fc9329b435039f3c7fe80ddd8fd9e67568e0b64d5d5ca9914934195fe4041
-
Filesize
692B
MD573a745df70b574354b8b760c594b7859
SHA1d17da1221f95b6d8177df4a9fcfa2a605e7e66ba
SHA25609fa172b5d8d839dac3f4e685cf972571a8a41e4c32a21df671b5f5eb4ec8fa4
SHA5123bd4af1ad25832f596ac8c7dbcf9f56751174e951d76aee82cbe4d200ed31b82e0a2b21de3e46ed2749cdc61a812035be24642cb70c3e74800ea3fd9be546ae7
-
Filesize
356B
MD5c35626c6752f450d0b4aba9b79674c83
SHA1cae432ac97604a11d69a55260f0aa741d87c9e49
SHA2566848236164ad61a110f7237db2921ea771eaa2da1de0ddf6dd85146e59cebae5
SHA512954bd47cae685ffc13b6f03919f81799a9c2194d851cfcd468fdf9cb6dacaed9925f7257c3d35b8a39b8be79c240f32f6edb824f7b9ab932960bc1f8683bdb25
-
Filesize
356B
MD52c59ebab777dbdb679b6c1d83d36d806
SHA1b1585b6b2bf8a062caaccff9869df01669805052
SHA256b7fb651c62fcd5b6acca0905f666fbdd45cedb3d0d273c6293f61c7b09ce9ccf
SHA512f2186c6a52bf78ec2f2ed44923770d50591af1cb25c035cc79c79658f4b5161cf09972d25ee84a3642df36c508d491793625547026bcb1ea13b5230c8c3e42ab
-
Filesize
9KB
MD50c31ef4855390954fdb53be38cc8d426
SHA1d8ce55a8b3c0a3464788a391f20082387ce79207
SHA2560e384c93676e8a0ac14828c7b3928f806e22285e6d7ea1408c5a2390648cfc83
SHA512e4222d9851943a7d94f6ba0917930394f5d4491f49f1b761bbe61523d4e8a54b7e255eaf07aa3aaf9561b87a541a5e81d5cc246c7cc97388aacd0de5454569e9
-
Filesize
9KB
MD5250f0ca2d856e06c6069842e7a850d2e
SHA131a9d1b06584e8fb392f3abe8d604cc9f419407e
SHA2562eb6254087750e27b6f21cf27b620e99de424f32ee3758298629de4ff9ad3459
SHA5127cc7722e040e2cc80768ef104d59a995b8c755687ce7a1b5c29ca335011d808598fe7329132532cc5ce58296603ba8ecc8f7c8a352e5c2517ab72c03292c0e04
-
Filesize
10KB
MD573449ec41b95bfb1173cebd979c2e1f4
SHA1cab4b035da0ec2cc74019b64e7526c2fd0445616
SHA2561bc85fa42508d711b29526d7b86efdcff39ef44ca22307518db5a6ab0ec01795
SHA512d76b53fef1424952c5f11960ef63cf286e5524e8959f966d142ca103d5296cfb4a4df6eec15612f5230ce0d5da97a064c22e2f752a80a107bc76d23f2664fc3e
-
Filesize
9KB
MD50636cac7077c419931493745b7fb0c8e
SHA1624ec606ec951c1578034b418814c24201c8fa94
SHA25684121c19e9d69bdb90219378ef1954a331eeaedeedfaa2751470f6dcbc7f5095
SHA5125f5ad629d1a1dc81a5b3763c0d4d21098e571c1f757eb05fe7adfd3e8eef9320a95f4629fc2b213732115ade170ce1fa67b6a38053dd00cccad93f7532bf307e
-
Filesize
9KB
MD59059343de4287dc6af809b5a4e17631f
SHA1b6d531cef6d815a4b37325cb9482b9022c17bfa3
SHA256365300e62338ec7196db6d7433ab36e9e36d8743087edec51a786bcd624d56c9
SHA51282bfdb8fabc9aca9c480c544d084e8b885982dacb5586997292dc9d0fc5e101b4e71eb9459b123874e0e043d7c3a75987d8802b7974234cfd0d649ff0de3e797
-
Filesize
10KB
MD5768a0df078cfac8a610197cce24282b6
SHA1f83464e5c72ea34d3e79884211f58b9dd9e5fbdd
SHA25698dfb2da96d5f01ed87a1a3ab198962604753fb1d2031030c8a35e085549b086
SHA512343768738d4aa6189ef35ead9ea60213dee9ebe593de8c8d22d988eb926d3e01f7ea4eca0f7619e7ae62e13a853b30f709ad1a37fcf8d6a8c594bc21e92ffc8d
-
Filesize
10KB
MD5e8fd7d845d54fbd0cd0cce732b9302d0
SHA1d5ba497bde5be33beacd0ecb65a2868f76f46c68
SHA2561b8b9ea9dc589b9b9018a7e70b8fc11e38df36472fb99f96534589d0937c6d84
SHA512c3e8ebd56442352937819cdd9a44714f60dcd5747037073a0902ce69f2c57d77dd35f0b7f6cb63fc0da05ea6eb199db76799d7adfc272470b904d7b04b8a59f9
-
Filesize
9KB
MD5dc8d5405a2c9a8276959708a2bb6b5c4
SHA109cf4e842a34740db5b17fe44042f160239a6b5a
SHA256e5c0a591bd3d0167a0d3abde6926ca3d00deae0324c7c71004290224676f5d3e
SHA51273888081b01cc6607d8354c887ac392b68b07a269e375317c6b3b4c2db3718bbccb2f73c7c594689069764827bf6753e0c4ba3fb1c5c1b0531871326c23f7d34
-
Filesize
15KB
MD5594c60f6a9cd90ff2dac906e02124811
SHA173397a879108d2c4830ef636c7215a10e18559a0
SHA256c7adf61fbe45d19e95e218ac831e94d121e07364698bce368b010f042c227ab4
SHA5120903fe6203b413fac3f6e9ad86b9d72740950067e4fc700ae883f5123949932c9b5243813b7e99ee2622c61de1b53d68726868d07d5d568095fd9218c683fd97
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD53865af7ae7f9216db3e0c7ae2d1df3b4
SHA150bd852b715dd4fec36394febb667513c4d42347
SHA256a892e844d97208eb6c2048890f746f6c9f4cd6f8913c02cf24512a62c8f500e1
SHA512adc83a8553fda16f5a7b1da94390da7e5730d53cc07c7752a81dee56ae9f76a2b0b2f12c057b063b371f9543c154d85937da4406c8324dd129b8ee29c4622ee1
-
Filesize
76B
MD5a7a2f6dbe4e14a9267f786d0d5e06097
SHA15513aebb0bda58551acacbfc338d903316851a7b
SHA256dd9045ea2f3beaf0282320db70fdf395854071bf212ad747e8765837ec390cbc
SHA512aa5d81e7ee3a646afec55aee5435dc84fe06d84d3e7e1c45c934f258292c0c4dc2f2853a13d2f2b37a98fe2f1dcc7639eacf51b09e7dcccb2e29c2cbd3ba1835
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\CacheStorage\index.txt~RFe59fc19.TMP
Filesize140B
MD5569006e337e8557cd4cf558638b454e0
SHA17bf8b3746596c301b1d1a4e505193373c0c9ff7f
SHA256df57131a5b51f756fbbe95d50abf0876d9ac7e3512d12f2dc0b3125dfabd7030
SHA512a5b93eff33a96cbff36d6f05ccd068c259a42def07f0ea4456f98183e7b0956f8e1780d9b3e5ca08cf5e4c915cabf0601168385e71fe442fbe972d737b0abfd9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\WebStorage\2\IndexedDB\indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
230KB
MD5c03173334491c955ade0506cd19cb0d6
SHA1b82f54f1b2b8e30bf6b039ff5a307fc7ddddc0ce
SHA256938e8201924d639f12140d3286005ad2ee2bd5b44c7cb860c063cf2ecd5ef796
SHA51221b7f69ccb287be6c32e24fe578a4029a5d08d8fa0c85ee6eb597b93288cb2659f6790fb8fb8d8c7c77e55431bc8ebf63c63bed06f2fde9948dc2dced97ea6ee
-
Filesize
230KB
MD59a3aac3e2c7ea8e34a0389f765ead560
SHA1db745cfd1db054f7d8e7a9e3fde21865ca8b7703
SHA2567a3e7d25a6c612e165d92a97dcfef9f8f5721ea45f5586ff258d64a84242a171
SHA51209f4df8f3a1b43350d43e8d5098c1ffcdafbaebaad7ebbd5a02d8fc14c05bcdf17f732b3882f049244db7fc74a0ce2ca753d3c6212a0322e75e619a1a64924b7
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c