Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
71s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 21:34
Behavioral task
behavioral1
Sample
SpeedAutoClicker.exe
Resource
win10v2004-20250217-en
General
-
Target
SpeedAutoClicker.exe
-
Size
68KB
-
MD5
9821e1e4aacd033130ebdc73c37e958e
-
SHA1
2971d7117d155309f860740d8edfb25f7b4dc947
-
SHA256
b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c
-
SHA512
a1eed0001124e21ad5ed1d9b010ab7fea175c8d5ea38366befe35c834e564995c919ad091fe54462abd2db0c5612cefcc047b852ce6cccd0b3ccd5534824bc03
-
SSDEEP
1536:R4BEioJRb0gPtcsur5Wfb62+496LvfOgMR5V:R4BEDb0gasur5Eb6y8OgMDV
Malware Config
Extracted
xworm
4.tcp.ngrok.io:11205
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/4128-1-0x00000000009C0000-0x00000000009D8000-memory.dmp family_xworm behavioral1/files/0x00050000000229ce-8.dat family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation SpeedAutoClicker.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SpeedAutoClicker.lnk SpeedAutoClicker.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SpeedAutoClicker.lnk SpeedAutoClicker.exe -
Executes dropped EXE 1 IoCs
pid Process 5284 SpeedAutoClicker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SpeedAutoClicker = "C:\\Users\\Admin\\AppData\\Roaming\\SpeedAutoClicker.exe" SpeedAutoClicker.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
flow ioc 44 4.tcp.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133853384809971816" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1924 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 4128 SpeedAutoClicker.exe 4740 chrome.exe 4740 chrome.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe 4128 SpeedAutoClicker.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4128 SpeedAutoClicker.exe Token: SeDebugPrivilege 4128 SpeedAutoClicker.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeDebugPrivilege 5284 SpeedAutoClicker.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe Token: SeCreatePagefilePrivilege 4740 chrome.exe Token: SeShutdownPrivilege 4740 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe 4740 chrome.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4128 SpeedAutoClicker.exe 5992 AcroRd32.exe 5992 AcroRd32.exe 5992 AcroRd32.exe 5992 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4128 wrote to memory of 1924 4128 SpeedAutoClicker.exe 90 PID 4128 wrote to memory of 1924 4128 SpeedAutoClicker.exe 90 PID 4740 wrote to memory of 968 4740 chrome.exe 97 PID 4740 wrote to memory of 968 4740 chrome.exe 97 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 3032 4740 chrome.exe 98 PID 4740 wrote to memory of 2172 4740 chrome.exe 99 PID 4740 wrote to memory of 2172 4740 chrome.exe 99 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 PID 4740 wrote to memory of 3004 4740 chrome.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SpeedAutoClicker.exe"C:\Users\Admin\AppData\Local\Temp\SpeedAutoClicker.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SpeedAutoClicker" /tr "C:\Users\Admin\AppData\Roaming\SpeedAutoClicker.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fff0fd3cc40,0x7fff0fd3cc4c,0x7fff0fd3cc582⤵PID:968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1848,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1844 /prefetch:22⤵PID:3032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1920,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1900 /prefetch:32⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2316,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:3620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4648,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:4284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4448,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4704 /prefetch:82⤵PID:4596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4712,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4404 /prefetch:82⤵PID:3676
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4788,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4044 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4812,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:4512
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4052,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:3768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4900,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4892 /prefetch:82⤵PID:2720
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4696,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4428 /prefetch:82⤵PID:5260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5144,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:5308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5132,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5316 /prefetch:82⤵PID:5348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5460,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:5728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5416,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5240 /prefetch:22⤵PID:5480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=4044,i,15412941693865160285,12791617502303597184,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:5140
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3648
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1468
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:5992
-
C:\Users\Admin\AppData\Roaming\SpeedAutoClicker.exeC:\Users\Admin\AppData\Roaming\SpeedAutoClicker.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ea06d37a040f48dfd2b35fbf7e876ca5
SHA1fa94fecd081e8eedb760cb8aa63193c0516db24d
SHA2562ed9a4d0a449402296b19463d5f26fc8bcf3552b7645108e3925941bba355025
SHA512bb62f961e5dab6bb896f7cf6d7dd168d35a8f61fe42f45578b2cdcff48b5739816101136c1f28f6812eb245513268cbe8b483f936fbd3df7b0f1b9b4baf10548
-
Filesize
576B
MD556566fb2880b6e60cc7c583d62379865
SHA178c199614b60890b8c13633973c0e30b25d0d36d
SHA256868845a6cba3563b6e86c7cf4cd4a59084c9b7605496423c0f4835df65694426
SHA5120a9cdd53438454b16bb63ba337b01859d23899a330bc64def25b849fe52c8f3c46ae9109cdf4b7ccc1dd7f0369b9370484f4bffc8d0514b601fed751efd7e724
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD5c38895f89efb0e119e413aa7549cca09
SHA15ebb7530009fe2ea51cf67a26b98230401dac896
SHA256b8978a0755c12aabd6c21bf34c2f64813658645e2ea38f6dfacda62ebd9415d3
SHA512c47c5409fbb2a6c8eb11ddc58b30602e28b593a60dd79390eeaef9d5829f75e0d7849bbfc6eb136c2761d1e4ebc7ca3a94d063d8dfd43b24f36b83d692363602
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD50895354f483f2a6968bd1866d4dc8fb7
SHA1488edb565e05e9451234b21aedfe6f08779a6a69
SHA25675ee975e24142ed92fa75231b0eee99cbe26cee6a9591646ee48f54a55ee4571
SHA5122bc763c2bd3b55ac0d90c601900c9a8713b3f0eae512c3a3489104504fff17c15c3d469c6fd4e44b3f6162271f779b4aedd006fc73f31e881961dcd40407d746
-
Filesize
356B
MD597f3133b2f9ec613a3aaf6a60b96ac85
SHA1603ae04530cc148ef673228df8cbe49f200d86da
SHA256d900c4c2db1a0d11520d4d6ab37389ed7d5bf1127cb30d4d8c7337adc1154b28
SHA512af307d0a01d0bb2c884b72e3ad828ca8fa0fbfdb8b8714921b67708f0ee6579b43a5c2030adbfe4c84a72f2fc4bf6792d83b9e6404760ffb3e4a81a40f06f03c
-
Filesize
9KB
MD5703b19975a2d85466be635984dbf6928
SHA17b26e83760b3073ee648d0de18e780f07ec797ab
SHA2564d3c36336938451b95b6d7181f9213da619f54fffc04999e9d03e3dc1a379fb5
SHA512a703bd40490e30c236d0b013748cd0ed2322a985dd4544ea20f45319ef2c5fe4e2f734a106eb4953abf3f625797c5a1f48d1a798fb50725fee1bfc2adac57563
-
Filesize
8KB
MD524d1ae8719316468e877424fcbe66e4c
SHA1727a51c01728ec10c1354677e5558097f15beff6
SHA2566e75e5e9c2d7df27367b81928ae7003473d1823522b20c20aa8f90c0c782dcfe
SHA512feeb636eb07a587ac01f6adf42912cf33f835a6a416b1fe22849083265f0757a5c1983f5a86aa7c4e7e2eb24e634cf3a765ea70047bd8e43d228170fccef706a
-
Filesize
9KB
MD5bd1c2ba220f26b41c6e4e8b595af7906
SHA141946525e54df2b11cd4d2d0e9346162b364fe7c
SHA25695997c76481b364f9e8f581824518daad031e3dbb183da44a8dbd8593236e161
SHA51237b76188545714ab66b98d12e2268cdf78f500f62a452fad96845972a59e0471d1730dc3dae9783ba87565985cb7ab65248bfebe0b527ce4b5e89e5e34a58540
-
Filesize
9KB
MD5a9bf822d139222434f26f7381aa9ff96
SHA10aee612f3575ae08cd1a3018a380825ed8e5747c
SHA2561717c01d8e457f2cda0306325c9b4617ef6fdb17b3331b87c72d8692f4931c36
SHA5121061ea62b10c09defd8d40c6a69bc0d6355fc76e815310a86b06b540d414dbc0f102e926df1ff13bd9a830525bef9b92b0e0764ae26ce7b6f0ca62e701b5afe7
-
Filesize
15KB
MD52cc4f487d90cbe6a6cd6ab7a2569807f
SHA16803d471d7ec7f493ab68b6acc1714eaa8d87e87
SHA2568118a0d9d13f8af53202ba2dc86fc8c154a4c9666983cead70d73a5de0779cd9
SHA512c07c9c98ab404660cc1e67fcc2f421a4446d5501b6bec5019d2f229907434491ab68b601c0b064dfe274753009686ac46645d51edf7282df03c09493bb476a47
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5dfd0c89970afa74cb6019436226794b4
SHA1b8291f0f6a1565b2ebce45d6b85dfe80871b8406
SHA256c7a980e135d85b8fdb56eb2779996dcd0e9479a519cd2f32eedec23dcc6637b5
SHA512e25ada8d3c79c82ca530787d848210f8e104195a3fddb49fd9cc93bcd4458016a1372208b6bd22bd020adbf58657a4686745d938c16b97a48926c411a3fcaad9
-
Filesize
245KB
MD5981dae5a0667624a8d765cfb809f4005
SHA120236c8277f3345f434c07dc49be9e036941ffcf
SHA256a037287fb95cc6c4d8e0f3416b80c3577a1670182554c0cde44e054baecd66ce
SHA512f9527dde14ca840874a7fc44c225eef2734f9abcaed2c993e6e982ddcde0e91a34ee3cf17db66c9f542bed054941939481496c6309a58520f7bbf661b364a39a
-
Filesize
245KB
MD569366ea080de439760bf909233f6e350
SHA175e8567fdce0161b924cdf01f3f2d1afb3a1fae4
SHA256badcb1ff08e7db0a938832ae819c549f4cf09787f833ae681f1e6b4b1497fcfd
SHA51250a19a0f7223acfc0b66632354742769c700ee9f50ded14aa70b98fd2a9b13f3a1ec12c566f8de36554c6123ccc9dd80847cdcf0a392d1f4b3fb61b9c6fef1bb
-
Filesize
150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir4740_1730424610\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
68KB
MD59821e1e4aacd033130ebdc73c37e958e
SHA12971d7117d155309f860740d8edfb25f7b4dc947
SHA256b1756113e2a0e25ae11fe444f0029f75a30b9c47794933cb066a63c84a78193c
SHA512a1eed0001124e21ad5ed1d9b010ab7fea175c8d5ea38366befe35c834e564995c919ad091fe54462abd2db0c5612cefcc047b852ce6cccd0b3ccd5534824bc03