Analysis
-
max time kernel
39s -
max time network
40s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
23/01/2025, 04:25
Static task
static1
Behavioral task
behavioral1
Sample
HorionInjector (1).exe
Resource
win11-20241007-en
General
-
Target
HorionInjector (1).exe
-
Size
147KB
-
MD5
6b5b6e625de774e5c285712b7c4a0da7
-
SHA1
317099aef530afbe3a0c5d6a2743d51e04805267
-
SHA256
2d79af8e1ff3465703e1dc73d3ef2182fd269ea2609c8afabdf1b80693405c1d
-
SHA512
104609adf666588af4e152ec7891cedafd89ad8d427063d03fb42a228babefc59428b0c8b1430cb3fc319a5014d2ee1083ff2b74fa585cab2d86cdad346e8b08
-
SSDEEP
3072:ckgHqUGSCoEslON/q178+oO3BAE4T/DvueX:cNHqUGSCPBh+7VST/Ke
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000\Software\Microsoft\Internet Explorer\Toolbar\ShellBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000010700005e01000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 explorer.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133820800054993892" chrome.exe -
Modifies registry class 19 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings taskmgr.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2096 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe 4536 HorionInjector (1).exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeDebugPrivilege 4536 HorionInjector (1).exe Token: SeDebugPrivilege 3576 taskmgr.exe Token: SeSystemProfilePrivilege 3576 taskmgr.exe Token: SeCreateGlobalPrivilege 3576 taskmgr.exe Token: 33 3576 taskmgr.exe Token: SeIncBasePriorityPrivilege 3576 taskmgr.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe Token: SeShutdownPrivilege 5020 chrome.exe Token: SeCreatePagefilePrivilege 5020 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of SendNotifyMessage 55 IoCs
pid Process 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 3576 taskmgr.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe 5020 chrome.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2096 explorer.exe 2096 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4536 wrote to memory of 3520 4536 HorionInjector (1).exe 78 PID 4536 wrote to memory of 3520 4536 HorionInjector (1).exe 78 PID 5020 wrote to memory of 3432 5020 chrome.exe 88 PID 5020 wrote to memory of 3432 5020 chrome.exe 88 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 3216 5020 chrome.exe 89 PID 5020 wrote to memory of 4616 5020 chrome.exe 90 PID 5020 wrote to memory of 4616 5020 chrome.exe 90 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91 PID 5020 wrote to memory of 792 5020 chrome.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\HorionInjector (1).exe"C:\Users\Admin\AppData\Local\Temp\HorionInjector (1).exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\explorer.exeexplorer.exe shell:appsFolder\Microsoft.MinecraftUWP_8wekyb3d8bbwe!App2⤵PID:3520
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2096
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3576
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4540
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffd2491cc40,0x7ffd2491cc4c,0x7ffd2491cc582⤵PID:3432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1872,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:3216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1780,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2040 /prefetch:32⤵PID:4616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2164,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3088,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3164,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4368,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4380 /prefetch:12⤵PID:816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4724,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4760,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:1016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4968,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:3148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5072,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5036,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:2612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5092,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5032 /prefetch:82⤵PID:1008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5144,i,8871221294014489523,16727736395899704236,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5100 /prefetch:22⤵PID:2552
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3132
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD57ca7c969a6b664f4248a0783fc734649
SHA160352bfa0cd65bbbdf2fa3414981a3392a44f0c1
SHA256ee6b5e0650ca2b4e52f07fc85b05e3695fdf433435c143be20650dce9a2e0381
SHA51244824aaaabbe2da21d06e027a734fa9018fb486d42a2911bf8bf240f79b8bdd37cfe476c728d585674fa5d96a2fb1de94c74951fa3f36633e8ed7f90e6c2ea97
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\_locales\en\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.85.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
1KB
MD5d6aa7ffdc088ad7dea199713acb254d3
SHA126c2f3730cb7da98733e5e1577b80cee4e9cadf8
SHA2568e6db142fffcc02974228640da4ba0a724f71fdf49f73bb21a0badc89608cda1
SHA5125c835d010e01a19d79884ab4f6ec017c0771a75696bf2a40c6acb8f1ee849b98bd98e79405c8400ddd699b964fe40730d9ee0a320e7eb3f6983265a8b357387e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD584fa4cc6bed86b2a2a5ded3af5acdd61
SHA1e9ed32e5fad7abfead1b58dca095966d8b130443
SHA256833bdeafb1d9273f8103668eee4075e6b4fe6342364c1d6b21184d428effa5f9
SHA512c4e6226d486d2238ad88122e57961e9e4ceb9062238c4d7f3c4b210ba4aa3265bf64f74a64e684f54613ff49b2f9ef4b0f3a20574f56eaa35ce5f1db00ae42f4
-
Filesize
9KB
MD5b5958bdf1043ae35bfab55d22323c7fd
SHA17f483e79dadf1183c195e58e35620e116f6fbfe8
SHA256b719739300b6e72ee4bc6b643ca23a1dac6879680cfb892041c9e534bc0ef478
SHA512ca7dee3116f4123f9532e0bdb5f9b0888d5d2a93f54368dd2d72c32978ce9a62928601ec261fe1a4bb1802d1c5f73d329baf0c7870155e723a78ea62e8a15d29
-
Filesize
15KB
MD5d3f75aa0b57acd93e8215a77ac78aa27
SHA1d68fe88b7d63ac17ec2d8808bc583da360f30c0e
SHA2569a68734f65039c3a2fb4b3baff2227f71262324124364ca01dd7b2a533a132cf
SHA5128ab8fbf7ebdc7228e8ba905d0981054a237bec59ca6a3af897663ea16278543bcdc4d4330c9ef45ba8efbfb41193774ffcac25f793ec4adf473d538a7fb63e83
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD562a7d902c84d31c6daa9f04b50a99134
SHA18699b1bf0eeb5fe693f88380feb41cbf19ea91ea
SHA25601db90a8448a21f9a6b52811345fb1f356a994d61c54cd266b3a4f5bfb497d49
SHA512d3e114b398642a26c6f6b8a8cb3e6801318be1234a38457913b7f2e5ce0cb0aec80e50cd77dd83f99e8613b04faf1ad93dfd330eef928883114c67dd778469ec
-
Filesize
231KB
MD5af1775a840c18aa094c9a335c4422f28
SHA166ca2ac097d43334f58a69f2f05923c9d6944de3
SHA256e44eb2dbb5873bf43f2a9de09a5b68928dc8139487b3309c8c1b14ebc7fedcea
SHA512eb64d19c54b417e01785cdbc25048d6d40621078484449dd9d55133672dc1c66a2b1679fcd8dfb28a715052ee80a229f87d5ff90df42cb952402640c6695de22
-
Filesize
14KB
MD56152423819f52978b849b5be671236e4
SHA1a4ee38d4cca5e990bed0d199f603477e87030fc8
SHA256feb05555b6830da7aa01e6dceae23f1e4f676b174eb57d713b986217c8b2166f
SHA5123f06752f38a10a299c0ebe4a2d605b2980c8841d728903a3da8de6c64c45d49dc84c2deb62274b0c2513bd388aa1510cb5589afc07278c9318d566d83a193108
-
Filesize
150KB
MD514937b985303ecce4196154a24fc369a
SHA1ecfe89e11a8d08ce0c8745ff5735d5edad683730
SHA25671006a5311819fef45c659428944897184880bcdb571bf68c52b3d6ee97682ff
SHA5121d03c75e4d2cd57eee7b0e93e2de293b41f280c415fb2446ac234fc5afd11fe2f2fcc8ab9843db0847c2ce6bd7df7213fcf249ea71896fbf6c0696e3f5aee46c
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727