Analysis
-
max time kernel
105s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
Thaler- Bau-2503477.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Thaler- Bau-2503477.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
General
-
Target
Thaler- Bau-2503477.exe
-
Size
518KB
-
MD5
5aae7e9a3faa0901088b43378653f55b
-
SHA1
64871a2169f880c841f13871d997d2e3aae9ecc1
-
SHA256
20f3f526fbe016d6a3a5c2531affd5bc7bb81c0bc686f30ed2ecc27408a140b2
-
SHA512
4cf432300ae0a4c06dd57e53d7c36a42663c7e0104452a679b75c0016716202446c53f45d6748caf7dab01aaeadd5e183009db32b8d0a3f4b407dfed16c5c7c0
-
SSDEEP
12288:nDGfx30gy32goNMOeRiowzxOpcfqFR7UKd4yW2j9EDq10ZM3:830gS2goWFRoG9NdF9Eoiw
Malware Config
Signatures
-
Guloader family
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 2 IoCs
pid Process 1752 Thaler- Bau-2503477.exe 1752 Thaler- Bau-2503477.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key opened \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook Thaler- Bau-2503477.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\linievist\unilateralerne.ini Thaler- Bau-2503477.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4624 Thaler- Bau-2503477.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1752 Thaler- Bau-2503477.exe 4624 Thaler- Bau-2503477.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Thaler- Bau-2503477.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Thaler- Bau-2503477.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4624 Thaler- Bau-2503477.exe 4624 Thaler- Bau-2503477.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 1532 chrome.exe 4624 Thaler- Bau-2503477.exe 4624 Thaler- Bau-2503477.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1752 Thaler- Bau-2503477.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4624 Thaler- Bau-2503477.exe Token: SeShutdownPrivilege 1532 chrome.exe Token: SeCreatePagefilePrivilege 1532 chrome.exe Token: SeDebugPrivilege 1532 chrome.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1532 chrome.exe 1532 chrome.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1752 wrote to memory of 4624 1752 Thaler- Bau-2503477.exe 93 PID 1752 wrote to memory of 4624 1752 Thaler- Bau-2503477.exe 93 PID 1752 wrote to memory of 4624 1752 Thaler- Bau-2503477.exe 93 PID 1752 wrote to memory of 4624 1752 Thaler- Bau-2503477.exe 93 PID 4624 wrote to memory of 1532 4624 Thaler- Bau-2503477.exe 98 PID 4624 wrote to memory of 1532 4624 Thaler- Bau-2503477.exe 98 PID 1532 wrote to memory of 1080 1532 chrome.exe 99 PID 1532 wrote to memory of 1080 1532 chrome.exe 99 PID 4624 wrote to memory of 1532 4624 Thaler- Bau-2503477.exe 98 PID 4624 wrote to memory of 1532 4624 Thaler- Bau-2503477.exe 98 PID 1532 wrote to memory of 4980 1532 chrome.exe 100 PID 1532 wrote to memory of 4980 1532 chrome.exe 100 PID 1532 wrote to memory of 1984 1532 chrome.exe 101 PID 1532 wrote to memory of 1984 1532 chrome.exe 101 PID 1532 wrote to memory of 5748 1532 chrome.exe 102 PID 1532 wrote to memory of 5748 1532 chrome.exe 102 PID 1532 wrote to memory of 1256 1532 chrome.exe 103 PID 1532 wrote to memory of 1256 1532 chrome.exe 103 PID 1532 wrote to memory of 1092 1532 chrome.exe 104 PID 1532 wrote to memory of 1092 1532 chrome.exe 104 PID 1532 wrote to memory of 5956 1532 chrome.exe 105 PID 1532 wrote to memory of 5956 1532 chrome.exe 105 PID 1532 wrote to memory of 5024 1532 chrome.exe 106 PID 1532 wrote to memory of 5024 1532 chrome.exe 106 PID 1532 wrote to memory of 6140 1532 chrome.exe 107 PID 1532 wrote to memory of 6140 1532 chrome.exe 107 PID 1532 wrote to memory of 3120 1532 chrome.exe 108 PID 1532 wrote to memory of 3120 1532 chrome.exe 108 PID 1532 wrote to memory of 752 1532 chrome.exe 110 PID 1532 wrote to memory of 752 1532 chrome.exe 110 PID 1532 wrote to memory of 3832 1532 chrome.exe 111 PID 1532 wrote to memory of 3832 1532 chrome.exe 111 PID 1532 wrote to memory of 4624 1532 chrome.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Thaler- Bau-2503477.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Thaler- Bau-2503477.exe"C:\Users\Admin\AppData\Local\Temp\Thaler- Bau-2503477.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Thaler- Bau-2503477.exe"C:\Users\Admin\AppData\Local\Temp\Thaler- Bau-2503477.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:4624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-fre --no-default-browser-check --no-first-run --no-sandbox --allow-no-sandbox-job --disable-gpu --mute-audio --disable-audio --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5"3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5 /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff982d7dcf8,0x7ff982d7dd04,0x7ff982d7dd104⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=1928,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=1924 /prefetch:24⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --mute-audio --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --field-trial-handle=1964,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=1996 /prefetch:34⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --field-trial-handle=2184,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=2196 /prefetch:84⤵PID:5748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3040,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=3124 /prefetch:14⤵PID:1256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3048,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=3128 /prefetch:14⤵PID:1092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3440,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=3492 /prefetch:14⤵PID:5956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --extension-process --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3476,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=4260 /prefetch:24⤵PID:5024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3516,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=4268 /prefetch:14⤵PID:6140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --extension-process --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3532,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=4292 /prefetch:24⤵PID:3120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4388,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=4280 /prefetch:14⤵PID:752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-sandbox --mute-audio --string-annotations --user-data-dir="C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5" --field-trial-handle=3412,i,12771114213033897198,18185416228151471889,262144 --variations-seed-version --mojo-platform-channel-handle=4368 /prefetch:84⤵PID:3832
-
-
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:1236
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ee260c45e97b62a5e42f17460d406068
SHA1df35f6300a03c4d3d3bd69752574426296b78695
SHA256e94a1f7bcd7e0d532b660d0af468eb3321536c3efdca265e61f9ec174b1aef27
SHA512a98f350d17c9057f33e5847462a87d59cbf2aaeda7f6299b0d49bb455e484ce4660c12d2eb8c4a0d21df523e729222bbd6c820bf25b081bc7478152515b414b3
-
Filesize
40B
MD53c95c9a8a61402f5439d23a28dc4f8e8
SHA1bb7b6745ed250354d5018c89d6a45fbed3f72e95
SHA256a04a70907293838a93dbf1cd6628ac4e25934c6f74a7628e3a765eed19865f2f
SHA512d8bf02a92169bffec4b1ec64df5f5c8efa34a6d081b20fc932194bd460c3cd5bcf039a8198d267d6fc2c2d40395ffc7c85dbf63c1f700efb701b04c13b6ebaf1
-
Filesize
44KB
MD5855fd27ff0aad5951b92baddc798c0be
SHA163810ba53e18f984acf7bbc818e0e695bbd386ad
SHA256385fbf126155ea93e05db85703d37444656838845bf28a644ff38088abd90a36
SHA512c584f7549e40a21e363bce72b40ec67eef0f1ed70845aac01e9a52caacd2a97865003a3e083a7d5fdcc83ded59f7779b970ead5e24eff96935c36cd145330814
-
Filesize
264KB
MD5341904f427b88b1dbdcf53e808ad614e
SHA13ee61633b60c802781e7efdb6757d0d138f78f6e
SHA25617875c9fdfaf81c5f44cc808cea728348585226ea6bcf1271d7477e5e944c583
SHA512da2080537c9195ae54700d08d4bb2a44436c318a941cef3611f58662bf17e988df3f9305c3f371dd59fd7dd834456dcb0afa007b8a00414ddeff582ebab7fcf9
-
Filesize
4.0MB
MD519501864c2def07847c8863728707f31
SHA1f2fa3b2b01b02fd902b1990074d7509aa135b66e
SHA25638a7f6ebfa886a286c2310dbb60e9ff4d80fa5d3d1b71b679885113ce1f29ee4
SHA512158c5135fd0cd388a04f34f87284384b85a27318094a26bd709865bfc9f85b8d9e6b2720d3939bb3c85ebcd97ea1d40f64b7a008c4042e5f2637bfd1c7ae984e
-
Filesize
35KB
MD5a9286dce94f7e968472bd2e8db3e4884
SHA1d54ad792816b2091f1da8ba36eb50ca39c72cf98
SHA25681c96f1144f34de8263a8f6d57157363416df54a242c9ab1c1e191b0812f639c
SHA5129a07f93fbc9b028b589edd14434e18f8d2589b4ea5df500bd002a40dd659c24fc7fd7b3d36dafcb534b06e77ee756b6c3f133b1070b715b9fedb5eb327c06f96
-
Filesize
256KB
MD5305573aee7e13bd8464ed7ffa409983c
SHA1a5e9cb960d9cdd9ddec75637c524510f08371677
SHA2560219b4d14b274fd03a82efab68b237b840a3dd49e3b3fe2525481fbc06993bb1
SHA512a89667abb5a7740fbaffefa3ed4a8aea77e5e864e98d2c508a746cba7a316a296caae567f5bf1af762b04af55655561dc6f403e54197c40750cd8ecd1046b83a
-
Filesize
306B
MD5ba64d8eced0ede431a0e62626d9feae0
SHA1c49494ab8ca3cf30c90622c3dadf491ccee04c15
SHA256925931cd1a9e84fadd30fd38ca2c9310fff534f512faf3f10d9f3661d324d190
SHA512712a4f2834969e675ddc1463232506f4b6a19edda1f10343651a8250ea73411192ea8d11fb23c6ba3a3bcec246490629c0168a4f65d76802b1ae4f4ef51a7969
-
Filesize
298B
MD52b08de158003f31d4b971a39ece3959f
SHA15b39ece924bec77d5802d540e725fc074f865afc
SHA25634d334a47437bae6d3650448f0237a09d82315bfb6917e33b624c3b48dc457ca
SHA512eb3650eee63d4a1ecc6ff8f8534c5e16693bbf378b3c083206b485eadc6507247cd64e451707427d698fa922a825e6b1f52d5add270baf4a8ba6e8de200182e6
-
Filesize
48B
MD5530d1059eb66f49ab34fabd5e709cb7e
SHA1930eec9514da6127abd903a2ff0acf47615be224
SHA256e92cb81ac5eeda287bb127db97c78daebfbb2f661ddaca8b12bffc045ccecd67
SHA5125fedcbddd7b6c95a0b3364193b56c09f4b779375046d2c58861d313af71d815f3e4158f7f2ce4ebf83330e8a56f36882adb95b0f56b48feb35722ae223d2cb75
-
Filesize
48B
MD5fbb8b384236362359b27cafef441cae4
SHA111577032490e4013e07b154b68966b94a040e8e3
SHA2567097c28384a0b84bcda411587f0c0192086942b6a2f13b1cfdb454b1bbd6ffed
SHA512d3e69f7b4f599f8b6edca759ebff5e06dacba87d5a2ca2e2cf16b771be8737f0c3d9b9aec87c21150972d800c862082fbc17de2a39080a2814fb79d136cf91a0
-
Filesize
256KB
MD517aaf189e6d9eb33499643e22dfa1c62
SHA19c1c90134fa070758d2d272d57e5a0d8a350ec94
SHA256d84dd104c5dbe960c494516edfcf56f0bdaeb75722e2065e74c79fd448948d58
SHA512129163209a13a545619af1042fb9480ed89769c35ff9dd93fa6794512137818d2ff03eab12e1926c6d5f92b41a94c87455da19ae6c7dcb60ee611baab9a35fc0
-
Filesize
256KB
MD5f46f19b113fe6910686c8157c548ef9b
SHA1603b6d3d2ad49bd928633a4db066c6d807ac36d7
SHA256dfbd757294cc388e13faabf68cd4dcdff04a7fb12446c19ae051c1f3b8916f95
SHA51201583e1a40450e84556830646b4ac7e5f338906685754c22cb310e721d5edd6b9bd95d2e0b3f59e9ace8539c698e07c8e7b92164c6ba0c552595d2a70e14e2e7
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
256KB
MD57f16bfce000757beff804823e9c69d10
SHA1169d6ffb2be33fe28e982615167e5ac0d5d494de
SHA25627804f341e5747df32c788068cb39ed3ba5e08886998e365fd15a19c35d50c2f
SHA51255d430436037bcbdad9da3d7f100594fddd81a54d07f94fe8c4692964f95e8fc0e82abb743a9cf8c190d7cd75116e25c49a178001d0f91475f18a13ff064354a
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
180B
MD5883d62acd72005f3ad7a14500d482033
SHA1e5900fe43fb18083bf6a483b926b9888f29ca018
SHA256c43668eec4a8d88a5b3a06a84f8846853fe33e54293c2db56899a5a5dfb4d944
SHA51297bb1bde74057761788436de519765ea4e6ba1ad3a02d082704e8b3efca3ef69d3db6e65b65e5f5f90205e72c164d82779cf754d52ec05d944df49f10d822a6d
-
Filesize
24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Temp\sbksq2kd.1a5\Default\Shared Dictionary\cache\index-dir\the-real-index
Filesize48B
MD585990a04ff0b7ad63e1d2249ae22a783
SHA1c6b571ef394fc738cd309df6228b9ba6b14e90bd
SHA256ee3a2f9f9bbd690b6cdf8a01e97bd4bc9fc459c07c95d05f069e80aca0268749
SHA512566a6e03165ebd182c6a50e4e0cc712c869845a546b5c6763d965605176f3cbbf392ee982d3e6243bdcc25e94e30cb70445e9c144c6af5749adf1bef6c1398ca
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
256KB
MD59243f3c2d5694b0e815ca1a350a51579
SHA1014b96d2527f58cb80cc7e7c9a66e93cb7ac25c7
SHA2567658eaa58d3b395466a48cd312cb56701bf9e634403a22f6196cf321403a1689
SHA512056880dafd863a426b94f64ebc5dfcf922ccc14596342b3dcdb53687de57ea7d8411d0d5f881ba0b17b0cf32c715cf36805c99d1c80aa55dc7ca96a6033d0ff2
-
Filesize
256KB
MD508e1f8cdaa6d5a462b306bfcdbacaf46
SHA182ee080059a09e20e868187dd7d434ee63277c90
SHA2562d6e266c629f24c129bcfbfc2135e2ffdeab4a44553e26681bf7f4c75cc72b0c
SHA512fed089ba48506dce25cb9e2604190b7a0ea0397f50d749f6f088530fd54c55b74b411dfe185db48ee9c9b8c19eb08369168db0178bc1cd465b493e576ba3a6d6
-
Filesize
13B
MD5a4710a30ca124ef24daf2c2462a1da92
SHA196958e2fe60d71e08ea922dfd5e69a50e38cc5db
SHA2567114eaf0a021d2eb098b1e9f56f3500dc4f74ac68a87f5256922e4a4b9fa66b7
SHA51243878e3bc6479df9e4ebd11092be61a73ab5a1441cd0bc8755edd401d37032c44a7279bab477c01d563ab4fa5d8078c0ba163a9207383538e894e0a7ff5a3e15
-
Filesize
1KB
MD59f4c9b762a2718e20cffd1f4beaf3c6b
SHA1cbb962eaa055ca4e5411c95f39f99bd5f612fb5d
SHA25696f8824f887e8168dbbf085be4c6010aa1c9d66ba8a86b1df5b50972e001c8f0
SHA5129a51c9a313de7d59438394b75a856db62c44d8689e42dc9d835a968ba2c5601bb43d49df293d32282d54239319013f29025d02223d463881bc0c7d33838b7656