Analysis
-
max time kernel
107s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2025, 04:51
Behavioral task
behavioral1
Sample
090.exe
Resource
win7-20240903-en
General
-
Target
090.exe
-
Size
175KB
-
MD5
db8894bf4ce76e35b2004521848994e9
-
SHA1
d5fc3440aa26b21ad26a20bcac88e969aec2811b
-
SHA256
5caf9a48b1ddfa68af323d973dab2689f8e53e1d5260cd26133f98f0a110120a
-
SHA512
533001155dfcd0c343ece9b4e3c849fe00d995d1eea90ecadb55474f7ce114a6b0283c441b76adf6eeef15c860e987f6a8aba29a42cb5fbc85b7dbf8f14839e0
-
SSDEEP
3072:+eKdWXjObksahJ5YBVJOo+ZhxBz65/M6If+3Js+3JFkKeTn4:ZOWXjObkL/AUxBt25
Malware Config
Extracted
xworm
192.3.141.148:4040
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/2664-1-0x0000000000E10000-0x0000000000E42000-memory.dmp family_xworm -
Xworm family
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 ip-api.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133858831154261901" chrome.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4884 msedge.exe 4884 msedge.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2664 090.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe Token: SeCreatePagefilePrivilege 2852 chrome.exe Token: SeShutdownPrivilege 2852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe 2852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2200 4892 msedge.exe 108 PID 4892 wrote to memory of 2200 4892 msedge.exe 108 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 3740 4892 msedge.exe 109 PID 4892 wrote to memory of 4884 4892 msedge.exe 110 PID 4892 wrote to memory of 4884 4892 msedge.exe 110 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111 PID 4892 wrote to memory of 3880 4892 msedge.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\090.exe"C:\Users\Admin\AppData\Local\Temp\090.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault4b4cbd31h7ec5h46b0h8e6ah9fe6293487ab1⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff93bf046f8,0x7ff93bf04708,0x7ff93bf047182⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17876276374449163419,14785103676394083432,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17876276374449163419,14785103676394083432,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17876276374449163419,14785103676394083432,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:3880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4464
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff93ca1cc40,0x7ff93ca1cc4c,0x7ff93ca1cc582⤵PID:3988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1880,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1876 /prefetch:22⤵PID:3748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2132 /prefetch:32⤵PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:4760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3132,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3140,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4548,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4528 /prefetch:12⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4700,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4692 /prefetch:82⤵PID:4364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4712,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4820 /prefetch:82⤵PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4844,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4984 /prefetch:82⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4696,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:5164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5196,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:5796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4912,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4900 /prefetch:82⤵PID:5876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5212,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:6108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4796,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3804 /prefetch:82⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4720,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4756 /prefetch:82⤵PID:5232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5260,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4908 /prefetch:82⤵PID:5784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=4768,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4988 /prefetch:22⤵PID:5832
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5080,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=240 /prefetch:12⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=4664,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:6016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=5372,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:5624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=3808,i,6461416387638880745,13773808888990904591,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4484 /prefetch:12⤵PID:5648
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1388
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5cae4376e7607e833b29962f72ec4c9fa
SHA195f7f979902efbb923fb02792c4f91104cae09c5
SHA256deb1ed23e3d69a057039849c08bdfb67b8af718ee54005b540f7a473e1ae7291
SHA5129edc5c62bef18476383aa427009a5c7f675c9786a23e8175f27f5cccd5108fd863c79b839c2619e4117d96f19280de7596f4fb438ecc13bce0ba83850dac7ce5
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2KB
MD5b4bab5f0031ccb7621e98fbd65f2705b
SHA1aa0e44217383e80b2cdbb26b31d0cc41e9e52c31
SHA256799151ba74cc155a6e67c87d62b0ed23ea66b6177cd5f33e383deea8af0e2656
SHA5121a76a0687a465205a753912198696d2b6d3825664485bd13633274d2df3a414d210dbad25d31166420044bf11b6a77ae50b2e2bdcea00a40d7274cd7c9aeb885
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5be03c926a4be8d9a51c7bc991af311fd
SHA113437f1efe468142b87df9c1a09f6de30e46b357
SHA256f9f737b90a1e0923f6951f2c7cd8b1a6642265c1bcde15ea74e73cd5cd66e503
SHA51292baa03a4f4f043a718d935b2b77e98d777b40349bfaae0e3b5563e58f68e902e91f18e65599a80a7f096d51cbdcb792962ebcaff57a4f2bb70119fba5c75d5a
-
Filesize
9KB
MD526b843e6319f61e356faf3629217c0fc
SHA1eaac685d1f1b166542ba82f5cb50e930c2248d0c
SHA256712f1fb967dd29aa8efdf2d1bec2882d6315f2fa479fed659d9da5afbb01c14d
SHA5121d38b83e64d9b56e6eb357c1772ba168e26a99f28fe23688780c3431388d18509630b30e21eabd81f12fcb918d085d66292b8d270b91c4e64c85ada2b43eca8b
-
Filesize
9KB
MD596b13f28f37846a922618cbcd7020b9e
SHA1a9de0255ecdd099e0a7ca3be0b4286fff7036bb9
SHA256705aa5fdb2c6197a1c13856197806ffd6a4065e6c926a19f6c04b73e52730f5a
SHA5121687f085ce474b0750635d8d91c770ebe7b0ca4639f6aa2c31964086b3a736ad8e6939a5fe51cc0c6f44100bc64c9f1f22044ec0f6821f47fe9f2b475fda4640
-
Filesize
9KB
MD5f7a8c27c9bf084afd2eef29b83e7417f
SHA143e5f6ac49935c6d32b999b0854ed40e5a875e8d
SHA2569ebbd440f04952dd2898be59ff8b9227530157e5bc623e8ecadb67d25e1e75c0
SHA512c6f1b88b29fca58f34fa306c1436de4ae82eb79f65f7dfbc47026b723b8692591f991208fd3b010bee3f5a200ab7c1e0ba2764573ad75b3135e987f7a4b7409d
-
Filesize
8KB
MD50d8e5742edda18ac164cc8b091b66254
SHA1eb64cc5e00d764d0adb779ac0e54979b6c11aee9
SHA25633b5c4ace2ae2d9928672661ef610e76bf41272d71067dd0cc8b275179806bdc
SHA512a867c1b3dab035471bd8521e97cc9d0f768a91253f93f7a0dfc6d397819c67e7440f0bd2a912b7b516629ac11a6d124a44cecfa639b8c1e71b888aac4b7b72bb
-
Filesize
9KB
MD5b886b35c50e9f0b8aaf2fdb0ec60985e
SHA1b3ec26bc7e777bf63de9ca909033d2032de8b1b5
SHA2569f405d6ce3de08741196a43057c39b1c67b5968cc0d1369ec7beebe99feaff1f
SHA51224329fe021f760540cfebd85ab9d21bcd73f39ab272e67c5c24ee8914eea7e8cb527990ba05615bf23a44aeda4af0ce5c76ca2bd426bd4cc8f17b0836f4d52bf
-
Filesize
15KB
MD5d159c49c00f67f2d49c63e9ce1e0eee8
SHA131c3ef0a2bc03a45b42d634d12169aaf69833e57
SHA2565344b79a577db6d182be967329f59521a954f0682a43820a8b4702917badbc0f
SHA512d3ad5c1290585aa25f892a51af1f0ffc366868cbb454a9bd38719a062c81118246a53b2ac2185cdce0b1f1eb0ecd33f9b4aad80b2bd9f894612f15a4b2ebffa3
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55c9fb3e508ebfa5af63578a3c51cc5f0
SHA1088c65074b224baf1abd0b5453817d4fdd08c0f3
SHA2563bce368c816fa9c6ab604c2c8faa3291d57aead5790af9c1023af31e905296d4
SHA512596077db1530f6449a893581ee96fcbfc09792f0aa21edb811888cfea561f868782a8d09bd7e8d4f0dcaeadfb6cb7f128f6c6d0cad2811d2b2c0dd1c9d75afac
-
Filesize
246KB
MD528da39f86108d5093456a0afcb289305
SHA1f5f838827eec0b8564bb1ff2df87c1f73e82612b
SHA2565e5568fc3c9865ed967b4655247bab5291d3a18d1c102a8309e1b0c78ad1e3da
SHA512d087c44f6506679163a4efac7c226954f550216fdfd8a51c87b32014c2104f11a417a854a104af6f0bf2ffc973ac800acaded8dca0daf846b15ca2dc228bda7f
-
Filesize
246KB
MD5a5a1cce1fb734826fa1bd04be877c933
SHA1a75bd104a785c0cbec265142552cb193a2a20a2d
SHA25643e05260327df661eb02ac5e11168a99a86af0ca539ee015aed68f5f760706b0
SHA512a6c49418ad9b65cf169a01a9b9433f3322e9a4a71aed3d669d22810bef6cbe6e1d106950a372684f8a5ce89c5114e32bad49f660a0178810511620af7f678544
-
Filesize
152B
MD594bd9c36e88be77b106069e32ac8d934
SHA132bd157b84cde4eaf93360112d707056fc5b0b86
SHA2568f49a43a08e2984636b172a777d5b3880e6e82ad25b427fef3f05b7b4f5c5b27
SHA5127d4933fae6a279cc330fde4ae9425f66478c166684a30cec9c5c3f295289cf83cbdf604b8958f6db64b0a4b1566db102fbcbdcdb6eca008d86d9a9c8b252ff16
-
Filesize
5KB
MD599fc0c73737e01416392f46d63a3dd4f
SHA18c0bb2a459a78451958b63ddb5dbcd10e0cabe0a
SHA256bd0f756170dddf4157aee380a075213b82032aeb75fd8d04b27b3c1020c3b4e4
SHA512b3bde2e299dc89fb45f8ce0d972d5e70e79ec3c0461d3d6c1f7a8c56080fe44419eab3c35ebc283f7e9d5157192c5fd2eb18b0b9af780f73379429d159b8a16f
-
Filesize
8KB
MD526a53d294a7f607fe309983b55e8daa9
SHA1a8f26d7d581c46caa471328e749915a0dc00df94
SHA256600aa623f36fc71c16e6fb6c47122896c7481898bfaa864aeee96ae8f3c56b2d
SHA512ce89e6703602320010099fe4ad66a2ae7a039c8beb6cd27e4687e3c15342d997375110f39dfe4e5d1d9912b14ab775005d09a9c43ae8e37435ebdcd94de2bc0c
-
Filesize
1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2852_1896828428\5179e61a-5f04-4761-a326-a12fd007eaf3.tmp
Filesize150KB
MD5eae462c55eba847a1a8b58e58976b253
SHA14d7c9d59d6ae64eb852bd60b48c161125c820673
SHA256ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad
SHA512494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2852_1896828428\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727