Analysis
-
max time kernel
153s -
max time network
155s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/04/2025, 20:41
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://mega.nz/file/rFdUmQRR#Tt2_tJ3TBN_M0D_-KLrOZkuxU72Y_c_SpNpTde5ESMY/trmr/472c53960a4c2dccd5
Resource
win11-20250410-en
General
-
Target
https://mega.nz/file/rFdUmQRR#Tt2_tJ3TBN_M0D_-KLrOZkuxU72Y_c_SpNpTde5ESMY/trmr/472c53960a4c2dccd5
Malware Config
Extracted
lumma
https://enhancrea.digital/opzs
https://nsoursopsf.run/gsoiao
https://changeaie.top/geps
https://3easyupgw.live/eosz
https://liftally.top/xasj
https://upmodini.digital/gokk
https://salaccgfa.top/gsooz
https://7zestmodp.top/zeda
https://xcelmodo.run/nahd
Signatures
-
Lumma family
-
Executes dropped EXE 5 IoCs
pid Process 1316 Setup.exe 4040 KKV8XLJ7RQPUZHPJ.exe 4564 HQU9R90EX3I8FRSR9VX5AKASXL2WMIW.exe 1844 atkexComSvc.exe 1376 Setup.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\atkexComSvc = "C:\\ProgramData\\atkexComSvc.exe" reg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5584 4040 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KKV8XLJ7RQPUZHPJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HQU9R90EX3I8FRSR9VX5AKASXL2WMIW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language atkexComSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4144164418-4152157973-2926181071-1000_Classes\Local Settings chrome.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 416 reg.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\31102020__IsUrPassword_.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4556 chrome.exe 4556 chrome.exe 1316 Setup.exe 1316 Setup.exe 1316 Setup.exe 1316 Setup.exe 1316 Setup.exe 1316 Setup.exe 4556 chrome.exe 4556 chrome.exe 1316 Setup.exe 1316 Setup.exe 1316 Setup.exe 1316 Setup.exe 4564 HQU9R90EX3I8FRSR9VX5AKASXL2WMIW.exe 4564 HQU9R90EX3I8FRSR9VX5AKASXL2WMIW.exe 1844 atkexComSvc.exe 1844 atkexComSvc.exe 4672 chrome.exe 4672 chrome.exe 1376 Setup.exe 1376 Setup.exe 1376 Setup.exe 1376 Setup.exe 1376 Setup.exe 1376 Setup.exe 1376 Setup.exe 1376 Setup.exe 1376 Setup.exe 1376 Setup.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: 33 412 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 412 AUDIODG.EXE Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe Token: SeShutdownPrivilege 4556 chrome.exe Token: SeCreatePagefilePrivilege 4556 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 2428 7zG.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4556 wrote to memory of 5416 4556 chrome.exe 78 PID 4556 wrote to memory of 5416 4556 chrome.exe 78 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 1488 4556 chrome.exe 80 PID 4556 wrote to memory of 1488 4556 chrome.exe 80 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 5420 4556 chrome.exe 79 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81 PID 4556 wrote to memory of 4884 4556 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://mega.nz/file/rFdUmQRR#Tt2_tJ3TBN_M0D_-KLrOZkuxU72Y_c_SpNpTde5ESMY/trmr/472c53960a4c2dccd51⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd443adcf8,0x7ffd443add04,0x7ffd443add102⤵PID:5416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1856,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=1852 /prefetch:22⤵PID:5420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1976,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2080 /prefetch:112⤵PID:1488
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2320,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=2472 /prefetch:132⤵PID:4884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1612
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4236,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=4256 /prefetch:92⤵PID:2348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5196,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5168 /prefetch:142⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5468,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:3328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5236,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5768 /prefetch:122⤵PID:3264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5772,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5888 /prefetch:142⤵
- NTFS ADS
PID:580
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5780,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6036 /prefetch:142⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=3676,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5964 /prefetch:142⤵PID:5600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=2324,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=6200 /prefetch:142⤵PID:5572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=5888,i,12308059934159707677,17374594288387398409,262144 --variations-seed-version=20250410-050051.531000 --mojo-platform-channel-handle=5896 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:4892
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5972
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004F0 0x00000000000004F41⤵
- Suspicious use of AdjustPrivilegeToken
PID:412
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5860
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\31102020__IsUrPassword_\" -spe -an -ai#7zMap14091:102:7zEvent89921⤵
- Suspicious use of FindShellTrayWindow
PID:2428
-
C:\Users\Admin\Desktop\31102020__IsUrPassword_\Setup.exe"C:\Users\Admin\Desktop\31102020__IsUrPassword_\Setup.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\KKV8XLJ7RQPUZHPJ.exe"C:\Users\Admin\AppData\Local\Temp\KKV8XLJ7RQPUZHPJ.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 6843⤵
- Program crash
PID:5584
-
-
-
C:\Users\Admin\AppData\Local\Temp\HQU9R90EX3I8FRSR9VX5AKASXL2WMIW.exe"C:\Users\Admin\AppData\Local\Temp\HQU9R90EX3I8FRSR9VX5AKASXL2WMIW.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4564 -
C:\Windows\SysWOW64\cmd.execmd /c "reg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v atkexComSvc /t REG_SZ /d C:\ProgramData\atkexComSvc.exe /f"3⤵
- System Location Discovery: System Language Discovery
PID:5808 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v atkexComSvc /t REG_SZ /d C:\ProgramData\atkexComSvc.exe /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:416
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4040 -ip 40401⤵PID:5424
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\ProgramData\atkexComSvc.exe1⤵PID:3544
-
C:\ProgramData\atkexComSvc.exeC:\ProgramData\atkexComSvc.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Users\Admin\Desktop\31102020__IsUrPassword_\Setup.exe"C:\Users\Admin\Desktop\31102020__IsUrPassword_\Setup.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1376
Network
MITRE ATT&CK Enterprise v16
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414B
MD5a88cb4e96edb09f5f2e01922a844f331
SHA16f524f531201ac58f9f544f60a2d256b4291c37b
SHA256dc5b698dcbb8e209a28d342df4594072d4bf2e9d0d0388c0aabb977aa8b330d3
SHA512fe3e789e0f2b1b77c853a2f4d6ba7e9a7b99e1ac9ab9382bc15446c3f065630459cc19c0de41388288bef5db2c1ebd1517360a163e854f40074644692f5434d5
-
Filesize
120B
MD5547b1785006a2bda2b46c900c75e91da
SHA10512bc82b9447858aec54ebcfa209ce07125990b
SHA256ef8a12a35dd0a83c4a080196d7787c4ac973befb16921171d458129b08e1624c
SHA512b4967020e1668c0d9e2df57c398e4f37b757cc3c1fd35a656d6550fc40bac6311a55d1f154eaf0da0359cb7f01f85d579079e581d93b97899ce306d1ee6c3321
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\File System\000\p\Paths\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
160KB
MD5389fb503052d0bf247dc23b884286753
SHA1f8a1d4c8895358646fd3c3bd6d77ba2f6746e42f
SHA2568fe52ce4a81d450313e170248eb2161621a1a8c53f2e508b1f062a5e44891671
SHA5120d570a27f396448e5428de0180544fa75386720ca0ec84631104137de8cd2666fe21cc510c837f49e08c870ee5807baa5247dae1319387c0c93a0027ee688fb9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
20KB
MD580aad24455d8fba08b149bd5d0ace411
SHA1aec1987bde5cbd0dcdf39cc817e62e68f59da558
SHA256e52a382a7c83a3bc88d750f54d4b094f5c877756904fbc18abaccfe5b4111642
SHA512298f430c34ab76b239d5942e24e6e6b04002d98f4e1d5d39ed0fffab9b23c2ef88c1a7b2c9c2e67818a31cfb7cc14ae0d9cd5d85dab3ef43d97a3f10eb5e23c7
-
Filesize
1KB
MD5611142fab54eb304c9616085a5ff1fdb
SHA13a8175c11c877f1691f860e5f7a92e13a8497877
SHA25661f4171cc1936c16601c8e4b4b2fed0b5e9cbe72b3e1561b37769c8641f50e26
SHA51249165206fe98a5742c577f4fe67e653beac4ffea290893a7e6272dc91d0da0ec5f96c212d1eafa6b9aa1f63373b8641bbaf5883744f8f288b4b2bf9371f8eed5
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD56cace002260bb4d2e5d6cbc63d7edd34
SHA15ff036c59b2d48257298602d66b501e224fe4d50
SHA2563e25f1e675df971cacabae84be78bab250f6e8b88c1ae8bcfd8b3b182896a6be
SHA5125920d2045db770db0e3fe4eccecc7c2e3daf37985e163459136f6b2e38d735046c8f1a71922dd6e4a6a69bde0d06a7d6a838af8c58201daf2d091e0ecbeaacbc
-
Filesize
9KB
MD5bc9b3ca3454affc93fec95e497d6f674
SHA16143aafeadd483a9251424366bbe9e72474f16c6
SHA2562a6b8fba074295ed1b33b8ed5b9ae2f9f201cb44bdb0b38b8f10ebf4c3097b5a
SHA51205f448e568eb2dfb8111635b1e624513ab2b9b6e5c72aea7d807e44586e42c2479fce4200bb56a086841c7159a71e8c4986e067432fcb075855a892ac7165ba4
-
Filesize
15KB
MD5d7dadd84ed3c27124999833093dc80a7
SHA1056729baf602bbacdb3c0bd2d8777c2b8a9ba572
SHA256123972fc14f6444a6103064a97bc89fd028513d0368e5c1f038401abcd1f888a
SHA512f87140383e49b355fa243d19c8ed19d0bd4d07c8bea588356e70a0cc70cfda56925cc2e842c97b283076f038a0e5e65cc126a84d317b87ee4db29f342b3dbbe8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize96B
MD50f2ca8da41da82746eca22ab3b3edded
SHA1141d5ea5f47c3d6733454911f5dc296366ede04e
SHA2560e47999891c0abc81e5092c47b27ce1f0fe0a159d3a0ade1fc85eeb0602ab351
SHA5129b8b40302bfb1f74b4e482b5924f56e7a5a6a6f992d1a9b3ec5fa6a0d9c24dcc0edc99d0e69c64f07b03df8a0099184508736ac139ad1e86d73f3416a7ac99c4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57cbac.TMP
Filesize48B
MD5a5ed0a9fa5f639a9e0771c127a13e6c0
SHA1c9a26b0277583fa6aa40fb4700440931197af364
SHA256a888ac4197b2038d3f02e457289154734d96d4b35776eeba47c4049161f9c6ea
SHA512c8665a59e186914ec420491322492f4863f262afe16966d411f5d84f4e2831d91705a960946ffa269541c4caad3d4a80e604344a2b0ec5e43d7fc97edda3928e
-
Filesize
130KB
MD509341cd35786169f8c91cfbebbb734b6
SHA17ee9b5be3e1a26bb08ca0c14a8d0893678949784
SHA256924f20a6f8d9b1b10f69be3fc85633bf2772aa7e805eb559217600a9a3e04f99
SHA512ccc25ecf4ae794dc9a4ade1e6d68eebe49f4f94e79147af80c4944939176ce74800efd5044d14905eb3fa82084e663f70cc0a73fd7c1cee465e099a029f4aba2
-
Filesize
13B
MD5a4710a30ca124ef24daf2c2462a1da92
SHA196958e2fe60d71e08ea922dfd5e69a50e38cc5db
SHA2567114eaf0a021d2eb098b1e9f56f3500dc4f74ac68a87f5256922e4a4b9fa66b7
SHA51243878e3bc6479df9e4ebd11092be61a73ab5a1441cd0bc8755edd401d37032c44a7279bab477c01d563ab4fa5d8078c0ba163a9207383538e894e0a7ff5a3e15
-
Filesize
78KB
MD541cb4fb943450f97e44d7af6e2e33002
SHA1aad6d0642cc507ce16227697845570a00bcc7b6c
SHA256dc63f6b0174a5b86f67bb137b957e85020fb3ee9886a967fa4e45cc724ee1818
SHA5122dcc5d36436549bd0125cd9b58c520505faa75b1814ff81d54ffc7d1b46a76d20521166f7ce8a535945f66c96c23e0e9715521e57bb10ee2d873c60e21095537
-
Filesize
79KB
MD54873e2dcdc67fc729ce4cc7456f4bfb8
SHA1a807062af81b82599759344d889407a044b571b6
SHA25654e03eb0e50d80758cd061e5cde7191d530ac0cf37d1b92974b8e60654040b4c
SHA51248144f92eddbf59f7b16e0c78ec2abbf15e30285e9c0cfdcce168f5d683710d9f6eb2168697def6496162f26e88fb99a002dd13b69add957b15a62121a76d353
-
Filesize
79KB
MD53eb3cc5454295dd858f8521f7cc5bcf5
SHA1202e664220cb0ca21a6b61239cf8b3d70aa6bd85
SHA25664e9d1c12bdf988889c1468dba873ae38978b66b11746cb26c0b26aff3680808
SHA5121598acfbe3ce119a322602bcd5bc736e77b84977df60756950755b0db3e4f850daa6c399740cd702b1d0ba69c74c11ba071a98f9632bbf94a1e96776c3d436de
-
Filesize
79KB
MD549b0675ddccfd29471333b52ca6d2946
SHA1135e91a1876b5571810efa033d56a0be7f4d066c
SHA2560ceba6078b52a27f1611360d301fa14d3aad7f4d9a99ff9afc9bbd95607a87ca
SHA512dcd7f8dd4c334e1d828de9dd16f6901336bfe165e6c5443cda968e48996c6c595f8c05082b6084c988d347233dba37d1171535500d4aa7fb99beb58ae4b2a317
-
Filesize
796B
MD5265e51037981a14ed99a5fc8c5ec1b51
SHA1d12ac588953298fdaf46dd5b4af8eb4cf6b06f0a
SHA256c4b07931b3fc37bc80d56a367783e7fa7c04ced4befec7f57ed079c38c960400
SHA512b18aa610811c5f9bc1dd829ad90a95568e81a41e1fd1472983dc00147f65045fd91fbc498b5263ce4f4c88b041be21f186ed2ce357d3bcf86c0429ca18991151
-
Filesize
10.5MB
MD5957e7d44b235699be79351c274cd8b99
SHA1e10f2b728fd02e49c80591241b239a96a029c6be
SHA2562e0a299e318a9a6928bc24b228e976a09c5322343bf0449620d42d04b615c739
SHA512baed1a2ea2d0476f61e5c10389998a5335ca18d790377c27330a91700078bb09b1f93d2e7457afa045c41b866ce732903f1b1a18038b72ca8579ab62a5bf5c35
-
Filesize
10.8MB
MD5b4f95c0def652145e9a081896c1ff0b3
SHA196e18c8e8e7d6548d4551038951a3231867f9ba3
SHA2566f0c30497c42675d68a4dfcddbb8b4a4699a28bbd05fc0feea91dc3c537c4ed6
SHA512200cc62bf1c9dcc48723b252e6c4abeab45e7e20346fa6da8b4aa58d47bfa1af3e47ac397df1ae96c8c6a6d4c2f3cbf856d583d275f4c06501c2961be8a32fb6
-
Filesize
15.5MB
MD57466bb5611d5a4b410c97aa8b189b74c
SHA13c119509ee337f6b08992da0da3f5ebc96d306a0
SHA2561fb22b261ae317f32f470c87ea593e61f2ad79f8523064a712835cf94ef81ec2
SHA51205d361a028726505d7852f7cda7929a813b47b0c18b05b1b205bba0bca441198ecc5ff1799d39b010b688461880983d88fc25577dc290d944f8553736248aa70
-
Filesize
3.9MB
MD5c64d09955fbd75e43ab73b720ec5bf77
SHA19efff18cbc7b5b9baf772b2348cabb141e23de18
SHA256fa402a12e0908c69ffca1afa65f3be8f8311647540f5968de4f041d77abd4cc5
SHA512c52f0acfb42f1ae13e13daf68437515c191ffbb967e90264a717274335d18277d26eb15e2ded387030aeb5c7ab9c95f58ea0c0b53a700bed918d251850136445
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98