Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2025, 23:23
Behavioral task
behavioral1
Sample
2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe
Resource
win7-20240903-en
General
-
Target
2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe
-
Size
2.0MB
-
MD5
25c7453c91603b0cb8fd42db144eec1a
-
SHA1
ab98bb0e9298a52584151715c7e56b22e3805dfc
-
SHA256
aac2ec6d7c967a64f915c785c3c95ad4e61ed7e6030fe724c11e02b5ff004a66
-
SHA512
b83800745668b4b6ce64d5c308702cefdb60cfa8988bc616766f0c1862a06d17938e794195045f17a46cca05046fd4716b123c953491066ba101a68890c66ba5
-
SSDEEP
49152:Jpny6WxdlwLCnBhqIzu0tqtH7rDmg27RnWGj:G6UPwLCnRltqt3D527BWG
Malware Config
Extracted
socelars
http://www.chosenncrowned.com/
Signatures
-
Socelars family
-
Socelars payload 2 IoCs
resource yara_rule behavioral2/memory/364-0-0x0000000000400000-0x000000000060A000-memory.dmp family_socelars behavioral2/memory/364-26-0x0000000000400000-0x000000000060A000-memory.dmp family_socelars -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\jfhgpjbcoignfibliobpclhpfnadhofn\10.59.13_0\manifest.json 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 5 iplogger.org 4 iplogger.org -
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 1 IoCs
pid Process 4744 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133818026263025453" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe 4956 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeCreateTokenPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeAssignPrimaryTokenPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeLockMemoryPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeIncreaseQuotaPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeMachineAccountPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeTcbPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeSecurityPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeTakeOwnershipPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeLoadDriverPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeSystemProfilePrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeSystemtimePrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeProfSingleProcessPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeIncBasePriorityPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeCreatePagefilePrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeCreatePermanentPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeBackupPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeRestorePrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeShutdownPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeDebugPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeAuditPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeSystemEnvironmentPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeChangeNotifyPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeRemoteShutdownPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeUndockPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeSyncAgentPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeEnableDelegationPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeManageVolumePrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeImpersonatePrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeCreateGlobalPrivilege 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: 31 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: 32 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: 33 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: 34 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: 35 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe Token: SeDebugPrivilege 4744 taskkill.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe Token: SeCreatePagefilePrivilege 2592 chrome.exe Token: SeShutdownPrivilege 2592 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe 2592 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 364 wrote to memory of 1564 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe 82 PID 364 wrote to memory of 1564 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe 82 PID 364 wrote to memory of 1564 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe 82 PID 1564 wrote to memory of 4744 1564 cmd.exe 84 PID 1564 wrote to memory of 4744 1564 cmd.exe 84 PID 1564 wrote to memory of 4744 1564 cmd.exe 84 PID 364 wrote to memory of 2592 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe 86 PID 364 wrote to memory of 2592 364 2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe 86 PID 2592 wrote to memory of 3200 2592 chrome.exe 87 PID 2592 wrote to memory of 3200 2592 chrome.exe 87 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 4332 2592 chrome.exe 88 PID 2592 wrote to memory of 5064 2592 chrome.exe 89 PID 2592 wrote to memory of 5064 2592 chrome.exe 89 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90 PID 2592 wrote to memory of 3928 2592 chrome.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-19_25c7453c91603b0cb8fd42db144eec1a_avoslocker_luca-stealer.exe"1⤵
- Drops Chrome extension
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffecc00cc40,0x7ffecc00cc4c,0x7ffecc00cc583⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1964,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1956 /prefetch:23⤵PID:4332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1556,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:33⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2084,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2500 /prefetch:83⤵PID:3928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3156 /prefetch:13⤵PID:1680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3204 /prefetch:13⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4504,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3648 /prefetch:13⤵PID:4156
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4820,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4712 /prefetch:83⤵PID:3020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4944,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:83⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4684,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5048 /prefetch:83⤵PID:3280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4840,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5300 /prefetch:83⤵PID:3356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5292,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5036 /prefetch:83⤵PID:4976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4988,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:83⤵PID:3184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=4836,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5372 /prefetch:23⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5416,i,16961022402819129962,8759858845080371753,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5376 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4956
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4208
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2632
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD519464c0f87744be22440533ba21f2c74
SHA16da452bbecf11b250193f89842e5d803d206dceb
SHA256c1584d43b05d36dcc258357cc58652566126a6cb6801dc61e29e644af72814b4
SHA512135b374282cddda2b806f8e0d9c11a52aee7b560f433ce3c65250559e3dc05dfc92bc9e22acf1a5744195ed3258d24399700a07b902859acc828e2bd8c3e08c7
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD53f0d2aae63331433921ee8bfdf61a06e
SHA110759ab6b42fae1d88b97c22ea7921845f53d406
SHA256a86b02dde33a4c5c5d8f7757003882e81bba4e52208931d80b2f5f319a0579bc
SHA5122254f8927d54eaa487ffae76ea77e544222f68b18b1284cd908c66a7e986741fbeaec8eee8d96f431f952efdcfe8862c5bb7d60b46afe6735619dadd4855182a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5b6b8b2a21efad54f7316446d2dadc8f0
SHA1c79d108944de63ad9f44f04bc6abafb52feebda0
SHA25624ec204ea97f8541fe8cf3574086bfae66aed0961067639bb0911437c83bbd72
SHA5120094a57eba750b3cf826ed67a0c66d42e88305347dfee09f38559018e779ffb18d759ab4267c8919d0e699b1d6c37b4dbd41edba16f447ceb5060963f2b40697
-
Filesize
9KB
MD5d934f6a802e679730345bb30ec95acd4
SHA1b2db20497597cd9c023e70bbe9a9bc4b369b6c31
SHA2565fafc7db82b0eaa84a4a95f2fc8e216e5e783ee38aae08a4acda268f5b922ef0
SHA512c5073a1cad976c93e3d74cbfb6197fdebf966dd652baa25de64809262117497fabc7b994b3ece3ba6d4979ff161f96aee2a0b113905b507eda1945138b7cdece
-
Filesize
9KB
MD5925896bffa16af674c54a7e25f8c154e
SHA1409c0bb4f26008f5c125d572e69882dccc263fd4
SHA25635079d7ae2386d366a07054de87e67d7b5f75b4d4c1e0ae467d8308e891e27fa
SHA512e583915cf98cbc9b8719b8ae3310452ee174c84980bef897e9fb5a70cc13b8b6cbde224a29f7a86418da9255fbc36093c874de0e9f8a6a4f4ccbd1a96123d12e
-
Filesize
9KB
MD5113588845585905527a41ca83cd47aae
SHA1f1da706a612f8c22172b7364bdee4ef1d41979a1
SHA256954b561015b7e3233f49d0f08848a2176308098050dda2380693be50c965ae18
SHA5124e85ea64787d083e8ec1f4db1b31c595c755b9e794fa72856fe98297a7b5268691d5415c88613f4467dace0bae98d2b6ae336032167e9470113e3c33940f7919
-
Filesize
9KB
MD5634adfe5ce66b08baf25cee8ae9f2383
SHA1f83a5be3ee9a8c911aac35e6e555a9da03854b55
SHA256f2bf4bf047de9a195aa83e67475acdc0651e06df7c933941e435dffa56fc6127
SHA512aefc7bd9d3808def5181c69b5833edffbc260daaf5305fc2f775fe4a6bb93839358bbcf3166aa1981decbb369ee37b103a580968383ecf25aac9735466adfb69
-
Filesize
9KB
MD565f304d220782335c68e6d6907090125
SHA1266ddbf6264277ae1e08c1abc0d8d1d90d3e5ff2
SHA256a7d14d90c86daf25f90b63c3ee16524b46bf4ae4232878601f73111bccf2e709
SHA512f15da98b82d4cc030f147862ba3c46e0f10b1aeb1d7e80da1d76f71e8028fe040547c1df469eeae546a70b758f4383745b3733b11df92a815d67e7b44db5ede4
-
Filesize
9KB
MD5780950f91f5315cc42c5a10fc7685366
SHA1aca28c90cb7d39f156ebfc7a031d395e02a43fe3
SHA256ab9665ccb9286503533795fccc7e92e5afc9e466701367ca04b21e2f48cc54e7
SHA51269bd10f4b3d8c197f82d6c5b97159422c5396134f4718d09321e2fdfe6c8890258e8b075a393e924aee7745a614668d0e9ab54d0acdb910bf012301b596cef66
-
Filesize
17KB
MD54e6df4d7e7c8659e93ca13af69dbb18f
SHA19d47260079e76cbd67b49a95519efb48bbc09995
SHA256deaf87f1e37ffa2363f18322148f21be236b2e5208edee7263e4bea8fc68c7f9
SHA5127a51e0e1bf190829125f5b478916d1d12294d9542d8ab5b723122e11c6a581b94e42e432bc0625ab9d4f7f6a7bc4dc191d4af79548ab9f33d8ed2e14b4affab1
-
Filesize
17KB
MD595fd246481aaf8b2c8541ec47ca08c4b
SHA1886f4e2222e6ff660c0cc13bde0dc937833184b0
SHA256a9e1bdedf270bb269b59c353ac9760f8e2c694038bd5caee7427ff2df0a5c1c7
SHA512b2f6ab89693d0700ed293f98a676fc5311f632e4c2854fffaefa4982003c13b7c669ba3f9528c327e82f895db49eae8d898ea26569eecf9c85ca435c55338e20
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD54449a29c969aecbf7502e65014dc3488
SHA14550880fa7468d73d978c5281c7fd6b4c3e0d55b
SHA25660cfccf1a227993a02c7bf1eaffb8a1a9593d57758f86a91bcd45453df1dd5ba
SHA512153e04e46a00e31061594ee945a7d7391448659e846f7947cb6566d10c5494c45f1d8452d45d6348ed0efc168508da0c679168d811edd183e657a336a984a3b2
-
Filesize
230KB
MD587430067d408970616a26d974f457bb1
SHA14d670ef0171bc16a5f0be73a610286732f5a371c
SHA2561a4ebb1b94a3a175dab10e4134f6637383e577901c2f77dcb5381f320d96d121
SHA512886e28b0433cb864d71ebd4b5e9470dc18798b53137d8c042e9be20c6e106d1f6c8f0667edc8b99332199b2b49345ec4c1914fa342e874ef43041a3ad2c9a969
-
Filesize
230KB
MD57ba5ae9f60632da7546a3a590fef5e67
SHA10e02697af80e62e0341a01e11540e4ae57584cb4
SHA256228a5e6cfc8909da62c286240b276b6ece5ddfc276959a2f472e48ac35b7e50e
SHA51208a51cb128ec5ce8bc6ed00529b84f050a00cf74cbabb2d0669cffe9fd641dd9783cd2381032e2c1852f8606f04f86ad52925d40593c300dc6d1f95f8cd60cbe
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c