Overview
overview
10Static
static
10SaladBoots...ad.dll
windows7-x64
1SaladBoots...ad.dll
windows10-2004-x64
1SaladBoots...o.html
windows7-x64
3SaladBoots...o.html
windows10-2004-x64
6SaladBoots...ad.dll
windows7-x64
1SaladBoots...ad.dll
windows10-2004-x64
1SaladBoots...ain.js
windows7-x64
3SaladBoots...ain.js
windows10-2004-x64
3SaladBoots...bat.js
windows7-x64
3SaladBoots...bat.js
windows10-2004-x64
3SaladBoots...fee.js
windows7-x64
3SaladBoots...fee.js
windows10-2004-x64
3SaladBoots...cpp.js
windows7-x64
3SaladBoots...cpp.js
windows10-2004-x64
3SaladBoots...arp.js
windows7-x64
3SaladBoots...arp.js
windows10-2004-x64
3SaladBoots...csp.js
windows7-x64
3SaladBoots...csp.js
windows10-2004-x64
3SaladBoots...css.js
windows7-x64
3SaladBoots...css.js
windows10-2004-x64
3SaladBoots...ile.js
windows7-x64
3SaladBoots...ile.js
windows10-2004-x64
3SaladBoots...arp.js
windows7-x64
3SaladBoots...arp.js
windows10-2004-x64
3SaladBoots.../go.js
windows7-x64
3SaladBoots.../go.js
windows10-2004-x64
3SaladBoots...ars.js
windows7-x64
3SaladBoots...ars.js
windows10-2004-x64
3SaladBoots...tml.js
windows7-x64
3SaladBoots...tml.js
windows10-2004-x64
3SaladBoots...ini.js
windows7-x64
3SaladBoots...ini.js
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-01-2025 02:03
Behavioral task
behavioral1
Sample
SaladBootstrapper/Salad.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SaladBootstrapper/Salad.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
SaladBootstrapper/bin/Monaco.html
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
SaladBootstrapper/bin/Monaco.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
SaladBootstrapper/bin/Salad.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SaladBootstrapper/bin/Salad.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
SaladBootstrapper/bin/vs/base/worker/workerMain.js
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
SaladBootstrapper/bin/vs/base/worker/workerMain.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
SaladBootstrapper/bin/vs/basic-languages/bat/bat.js
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
SaladBootstrapper/bin/vs/basic-languages/bat/bat.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
SaladBootstrapper/bin/vs/basic-languages/coffee/coffee.js
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
SaladBootstrapper/bin/vs/basic-languages/coffee/coffee.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
SaladBootstrapper/bin/vs/basic-languages/cpp/cpp.js
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
SaladBootstrapper/bin/vs/basic-languages/cpp/cpp.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
SaladBootstrapper/bin/vs/basic-languages/csharp/csharp.js
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
SaladBootstrapper/bin/vs/basic-languages/csharp/csharp.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
SaladBootstrapper/bin/vs/basic-languages/csp/csp.js
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
SaladBootstrapper/bin/vs/basic-languages/csp/csp.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
SaladBootstrapper/bin/vs/basic-languages/css/css.js
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
SaladBootstrapper/bin/vs/basic-languages/css/css.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
SaladBootstrapper/bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
SaladBootstrapper/bin/vs/basic-languages/dockerfile/dockerfile.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
SaladBootstrapper/bin/vs/basic-languages/fsharp/fsharp.js
Resource
win7-20241023-en
Behavioral task
behavioral24
Sample
SaladBootstrapper/bin/vs/basic-languages/fsharp/fsharp.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
SaladBootstrapper/bin/vs/basic-languages/go/go.js
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
SaladBootstrapper/bin/vs/basic-languages/go/go.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
SaladBootstrapper/bin/vs/basic-languages/handlebars/handlebars.js
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
SaladBootstrapper/bin/vs/basic-languages/handlebars/handlebars.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
SaladBootstrapper/bin/vs/basic-languages/html/html.js
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
SaladBootstrapper/bin/vs/basic-languages/html/html.js
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
SaladBootstrapper/bin/vs/basic-languages/ini/ini.js
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
SaladBootstrapper/bin/vs/basic-languages/ini/ini.js
Resource
win10v2004-20241007-en
General
-
Target
SaladBootstrapper/bin/vs/basic-languages/bat/bat.js
-
Size
2KB
-
MD5
4cb475399c4490eea41982dcd6d9653e
-
SHA1
fc97d57206ff7fa1c89ff0fc9f6e2f04a20ea185
-
SHA256
9bca42394fe8922fec24b768eeb8ce04692de6fad82f9052d5b7e70f5c6b0f40
-
SHA512
27eefe83cf38a7d784414d99b472f6fcd7e595691eb0f368254ba1f71aaf702840b62bf232c30c515a8fada234699fefeef496c0c24669cc158cb567227e4783
Malware Config
Signatures
-
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133814666991229945" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe 4060 chrome.exe 4060 chrome.exe 4060 chrome.exe 4060 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe Token: SeShutdownPrivilege 3120 chrome.exe Token: SeCreatePagefilePrivilege 3120 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe 3120 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3120 wrote to memory of 1612 3120 chrome.exe 103 PID 3120 wrote to memory of 1612 3120 chrome.exe 103 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 720 3120 chrome.exe 104 PID 3120 wrote to memory of 340 3120 chrome.exe 105 PID 3120 wrote to memory of 340 3120 chrome.exe 105 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106 PID 3120 wrote to memory of 3876 3120 chrome.exe 106
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\SaladBootstrapper\bin\vs\basic-languages\bat\bat.js1⤵PID:1156
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3916
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffaf2b9cc40,0x7ffaf2b9cc4c,0x7ffaf2b9cc582⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1884 /prefetch:22⤵PID:720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2100 /prefetch:32⤵PID:340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2236 /prefetch:82⤵PID:3876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:1440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3748,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:1772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4768,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:2020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5052,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:3400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5044,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:3972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5160,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:4712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5084,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:2800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4996,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:2364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5400,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5324 /prefetch:22⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5220,i,14754015201617034313,8843103812575146272,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2352
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5e01e03cf191686fee6cad8ee59409b01
SHA15039f3799c33ef910d126c9035775d8b5ef6642f
SHA25604217b541b1c15a015c8d7e9880afcd139e726168c99fb5ab2ca59f6d430ec0c
SHA51280ace90b79ef16d1d07cf82f097b56c41aa3b6266bf9570f19e753e4770aa256d60c6d8e2c0dd4d0ef89e62c939ccfa4f6959b05d85c855c9061f76320f69ba2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD5d2b047970e5d28b66dda551fbc20dd7e
SHA104fc6f9a20df2e76ac8edef773accbaa693ad718
SHA2567ad671994ec1d83dd683c1f3b0472a1bd0465b6afd7fe7931838361c5b54e767
SHA512050fb8f4a10b059f6973ed3267ede9df9c1c9352d4467f67abebbd6bb865b82bfd1a90cc08cf4a30f81e0ea3970dc4b5e6684b88e1f92b43048db3380896578c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD54a69837a2423ef3f699d85dc491e5277
SHA1313d4f3c4fc8be6d79b6a096031e8119f62e998a
SHA25614d193855a6a14bc3591a799f53a4bdd9d526d786b39b696bdf641dc3a4dace5
SHA5128f7fe34efa2aa516e9b086be096599c6c6007722b60741c6a5ea5cd8e6e60ab7795c2e676864fc2cc5ecf90b9ab628778cb0af5b71afb2e22b34b13d34b9239c
-
Filesize
9KB
MD5d42c3cf1d8ddfc141b36405a61f66ab3
SHA1496221f29990479388093d855225e8eefa5ef7e1
SHA256b9a9ef62edea589dda47583cd90da79bf80dd6ee0b68d7264b9d6b513060f2e1
SHA51272445a82a95b2035be7b786d4e281e4d3e1c1877b3b933a711c9c99e3245c2b39532873e0833c49a691ae25749e58cb1e76938da51ed752f3585e6f227a9908d
-
Filesize
9KB
MD56bec2952501a7f450f89dcd07fb61f91
SHA187618b6abe073a98eb129cbdaff91b5a4ec1146d
SHA256f9342aa3cf5c4c604b34992c7b77e359eadc7444e9fd8f3885015f68b20c3516
SHA5120805a96decfc424852b3c5fbf6bbdb09b09b0fdc08ed05c2c88b2a14007ef0fa1fc8a1d3cc0ccda4201b9ec94fb7c0cc2979ee11747de551be58e46e38e2112a
-
Filesize
9KB
MD5398627fab642225b6e91a5b4215cac9c
SHA12c72f9c8ddde92519310b0b063fe530cd2bc64f3
SHA25674a1179b5efeff2a930ea65cdfd474390979b277322d0b5cd38bee04b9278240
SHA5129d0e39b4dd9934f494db407bad940de3348fc2996a4cc3f7a0fe7d5e7806a93d903d42e07653ddc39cb0e37f59e8e54d5f1f90c6082bbab6d49986435c7519a9
-
Filesize
9KB
MD5dc6a9e84ccde6bb5c5ff004bdc74e174
SHA182949fcad511033a8280957f4c9458202f980384
SHA25689b488748e9c1be6033fc3254a0beb94a4a78508c2c83c46cac78b96dc19911e
SHA512a9045c2df55bfff029ed73f70bc28c7664ff935a8e1a3edaf5127d0267e81d3f4b521fb821da6dd371b8f9160903bcb864b63905dca37339f1be0f5c0a127dc0
-
Filesize
9KB
MD51187c78780dc3641f91d56e03e6b0843
SHA146256000bcd6eae863b6d02cd4fbcb22a48a06fa
SHA2564927aebd4f20eacc13e82cde0d552ceabc2530e885837480af98c86c902d214d
SHA5124f7ee6870e0848cd318ae62a9759a216c7075c1546b8ac5e60e00c4b7be8cb767d6e1024608b244252378b7ee9e86201457393f97e89ec6934af3bc3e7d1981d
-
Filesize
15KB
MD5c4d229009aa663cd6507f219aba64f9a
SHA17aa0298173c2740b94c5ef0f4072fe9e8f234e1a
SHA256cb146f798a944ceeb2c4df578263fffbc9b61ec3864d22207e3864de9a640150
SHA512c7a4e11b5de455d37ed603c0adf73f909e6ef074665d9cfd35bf7633af32bcc326c4e5dc314658fdadc500ce672bb85de7185e61faa68d14c9920baf070476c3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD52f5b919ee6ed76aee0235c24110800c9
SHA1cfb1edae41e0b34a08b8a4bd8558f7127631e270
SHA256770b074102c60c6ab5ccd11f2b01969807b339dab66cc804c0011719e1975c47
SHA512ed5c7d07fa3304581ce940736352a535b437d629d1f63fb6c0a1fbf27fb03db077dbbb52e87610d9a373c95b27faf805d5dc2a3424ac9b7384c05754718dcf56
-
Filesize
230KB
MD5210ec33a80b6f812322744bb9afe1722
SHA1872d98e93e2173fc90eb26271e671f4826982b04
SHA25696433bb790cd008097879ba2bd2c4307f2f9e0d258a2948d09e389481aa9fc47
SHA512508dc8da4bf93c39f49492b50bb47e8b1f247bf4408e7dbdd8ccd73a09c2bdec830a3f9c95830e3c457cf4076c87a7003b5548d0053b5309e5d3cdf33703c301
-
Filesize
230KB
MD5bd11106279cea66c52bede479ae8cce8
SHA102b38b11fadbe141401d951942733d58a607be1c
SHA25668bdb124f42905f899ccf4f512d85cf05a330c8ff31d0720a7ddffce2a8958aa
SHA512da5614b524e7c2e24819f0333f56aeb7598f3162c86dc0a3aa260fa7680c3592733f79d6828af4346d54f62428d74d68a9e76308f6b5a1d42bfdde7939784426
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727