Analysis
-
max time kernel
47s -
max time network
40s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/01/2025, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
HorionInjector.exe
Resource
win11-20241007-en
General
-
Target
HorionInjector.exe
-
Size
147KB
-
MD5
6b5b6e625de774e5c285712b7c4a0da7
-
SHA1
317099aef530afbe3a0c5d6a2743d51e04805267
-
SHA256
2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
-
SHA512
104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
SSDEEP
3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133818876900852701" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 18 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3973800497-2716210218-310192997-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2196 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe 4620 HorionInjector.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 4620 HorionInjector.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe Token: SeShutdownPrivilege 1740 chrome.exe Token: SeCreatePagefilePrivilege 1740 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe 1740 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2196 explorer.exe 2196 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 2324 4620 HorionInjector.exe 77 PID 4620 wrote to memory of 2324 4620 HorionInjector.exe 77 PID 1740 wrote to memory of 3752 1740 chrome.exe 82 PID 1740 wrote to memory of 3752 1740 chrome.exe 82 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 3680 1740 chrome.exe 83 PID 1740 wrote to memory of 1452 1740 chrome.exe 84 PID 1740 wrote to memory of 1452 1740 chrome.exe 84 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85 PID 1740 wrote to memory of 1660 1740 chrome.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"C:\Users\Admin\AppData\Local\Temp\HorionInjector.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\explorer.exeexplorer.exe shell:appsFolder\Microsoft.MinecraftUWP_8wekyb3d8bbwe!App2⤵PID:2324
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2196
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffada15cc40,0x7ffada15cc4c,0x7ffada15cc582⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1792 /prefetch:22⤵PID:3680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2112,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2116 /prefetch:32⤵PID:1452
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2188,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2380 /prefetch:82⤵PID:1660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3096,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3108,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3088,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:2092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4752,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:5944
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4804,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4792,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4312 /prefetch:82⤵PID:852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4864,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4760 /prefetch:82⤵PID:1724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4888,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5004,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4900 /prefetch:82⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5312,i,9998474016051272658,10734836752174427043,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5288 /prefetch:22⤵PID:5368
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD54f168b57d055b8e7580e3d6f323f6c54
SHA10cbe4d55a4f9f049c5197d2cc1db4151ae5aec50
SHA256e8141eebe7cdcaaad5534e10a7b38217ad05c914f2f1ab934e54275d1d2fba56
SHA512c2641641600992d42143ea886557864704e53b6acb71305e1ae39075415486e861c3eaecd84366d230baf54ff02be03bf145de6356008a9049550a010d58f8f3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD548524dd36d3ebfea019a866449b51191
SHA120ca366faab406d3ff813ee5c8c7f2cb241f516d
SHA256e0e0d755423d904d3d04d29f58d4efa7bc78d58c58025c9e0b10251efa6432de
SHA5120a90616319e7530529e657ce650065c051817d36b15419230a9593dfcdb714068a7778b475ef0ac898def35aaec4e62ff09bd937d923519a947824ad5865fb1d
-
Filesize
9KB
MD5648290b507be7255c632061a60bba00e
SHA11f6d435d20404855a0ec7fcaca1bc40639c4217f
SHA2567ff45539b3746d63fdb801aa5a58410c11c1bf75a522649bdd402d2cf9974a40
SHA5122b5e257d4560c6c49d344d645efb26955b2abd6533675e906a53c0623f3191f168e459f91e7227d878110c91e85627ae52f77c3987f4ff6bc222c0c73afba823
-
Filesize
15KB
MD5fbfa7b2af2f17cfff4f5cd97477ccfe0
SHA1bb18d70d7570c8960c16720797be43aa8cabc94c
SHA256e04d7920329ba995b37413afd23e3df8e0368dad783b1e44b0712e8c81dcf76d
SHA512f10937e47cbc5bd890731ecf874cb8f6ed4a7d0675315e62b21ad3e2aa4c2e7be5859a8cd046299626d6e3878062d74c8f1851d66c52751d6f2ce67d9ff1e1f8
-
Filesize
230KB
MD50d61b1110f625eb2d886fbe744d8a436
SHA12333f408678ecee26885f1b8133655bcf1391ff6
SHA256b6eb47f6d59b105274cf4cecc588ada54071854cdf666ddb4cc4b67288b672f2
SHA5120955f7e39796b783d3577dce02ccf481ca86c9421f4fb09e90c09504affbbce564fa99222c52537c3c69b2c165c2b81558d70f74f01c093b342b38f5747737c9
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727