Overview
overview
7Static
static
3geode-inst...in.exe
windows7-x64
7geode-inst...in.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Geode.dll
windows7-x64
1Geode.dll
windows10-2004-x64
1GeodeUninstaller.exe
windows7-x64
7GeodeUninstaller.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3GeodeUpdater.exe
windows7-x64
1GeodeUpdater.exe
windows10-2004-x64
1VC_redist.x86.exe
windows7-x64
4VC_redist.x86.exe
windows10-2004-x64
4XInput9_1_0.dll
windows7-x64
1XInput9_1_0.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 21:16
Static task
static1
Behavioral task
behavioral1
Sample
geode-installer-v2.0.0-beta.25-win.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
geode-installer-v2.0.0-beta.25-win.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20231129-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
Geode.dll
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Geode.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
GeodeUninstaller.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
GeodeUninstaller.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
GeodeUpdater.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
GeodeUpdater.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
VC_redist.x86.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
VC_redist.x86.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral23
Sample
XInput9_1_0.dll
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
XInput9_1_0.dll
Resource
win10v2004-20240419-en
General
-
Target
geode-installer-v2.0.0-beta.25-win.exe
-
Size
25.9MB
-
MD5
739fba4e8399983df01dfa4dd6db2052
-
SHA1
e9a981a70fe74074407cc484aea6673a38dc7c9e
-
SHA256
d3efb7084142e12b3fe6cdb51c46c1ae643451cc73b4fff3680b307006ff0460
-
SHA512
7c685992d9c47be33f4fb80483a74e02bba07972d41a67b87508fcab3c4f8ef3ac3fd2ff8be72f15c648c55c8e01c14175985e1ac42dd9d7b509bf5d44d7fff9
-
SSDEEP
786432:UH+yMa+SPOmfqMxIJ0gDD3untXB7Ep+zJfKcf2zuP9N:UH+y3FO+0tDuntXB7E4zH289N
Malware Config
Signatures
-
Loads dropped DLL 3 IoCs
Processes:
geode-installer-v2.0.0-beta.25-win.exepid process 2368 geode-installer-v2.0.0-beta.25-win.exe 2368 geode-installer-v2.0.0-beta.25-win.exe 2368 geode-installer-v2.0.0-beta.25-win.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 2692 chrome.exe 2692 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
geode-installer-v2.0.0-beta.25-win.exepid process 2368 geode-installer-v2.0.0-beta.25-win.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe Token: SeShutdownPrivilege 2692 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
Processes:
chrome.exepid process 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
chrome.exepid process 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe 2692 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 2692 wrote to memory of 2940 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 2940 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 2940 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 3020 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 2552 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 2552 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 2552 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe PID 2692 wrote to memory of 1948 2692 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\geode-installer-v2.0.0-beta.25-win.exe"C:\Users\Admin\AppData\Local\Temp\geode-installer-v2.0.0-beta.25-win.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2368
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef65e9758,0x7fef65e9768,0x7fef65e97782⤵PID:2940
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:22⤵PID:3020
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1576 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:82⤵PID:2552
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1624 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:82⤵PID:1948
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2292 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:1220
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2304 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:296
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1160 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:22⤵PID:668
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1480 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:2348
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3320 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:82⤵PID:2420
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --mojo-platform-channel-handle=3364 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:2932
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=3012 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:236
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=3448 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:1648
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=2416 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:1988
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3456 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:82⤵PID:2996
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3500 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:82⤵PID:1212
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --mojo-platform-channel-handle=3436 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:536
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --mojo-platform-channel-handle=1092 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:1292
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --mojo-platform-channel-handle=2384 --field-trial-handle=1396,i,7914521465002860413,8132322209851095374,131072 /prefetch:12⤵PID:2496
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
5KB
MD5e21becc968169037e0d757c687fe42bf
SHA1087f296ef49d200d5bf32ffaf32808078a3db86d
SHA25628a7ff63d5b5680ce9536f938b51b2e09ca9ec40ebf8b5575194c8f5d9ced8e7
SHA51211660727d49f454cc2143223db1fc22bdb1f80d90830f76a572b4c8c3929670603a2a3ac4b8bb50f418959ab1a9e5e789fa0e37cbc3ebfe5ad62f0d191c14e3f
-
Filesize
5KB
MD5224da78b21a04d01186d52720ee353af
SHA14eabb0ce17ae3bdb28ff50f87b1aff10b080993b
SHA256133c04d5e6c4da1c15817a3aa747f723641a35d8be259b8e9fcca92e554c6eaa
SHA512287c472302b6abff4640e1d50aa349a38528c1476f751364b8e7e86c03c59f73fa83953c947af2f3e8aa2025c0035fe40e7598ce818718cdf274989bf57605a6
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
141KB
MD532b100b8d37ecf16035bb871c80a45b2
SHA1b5b4ac4e45a6083fb728207d9b83e49a5af17aae
SHA25655a54e1260981f5bb898ae6efce9d88672abacecf27609091194c29a34143e14
SHA512c249588e9b3376e2f027bcb31014e5998d3e840079ce32c587d8075346d7856b713803ae6087d950a7b6bcbfa29520cd5a38f22b09535d853101e2198250b0cf
-
Filesize
140KB
MD58e1688d843c8c2972d259c7afe3f8981
SHA1aae254f8c017c85d057feb603fb9927b8030a966
SHA256e3630beab02ddb6f94a68be3f3cc320c89c2c23b504bd5e6b992d385af9303d3
SHA512f18798534e95e8f1e4b8f9857bc34d8a6f4fdf469fcd8e44bd414e9df15f84de12b34fa3568fcc97e7738278c262258404ddf2f8200eb71408c2e6637afb3ce3
-
Filesize
141KB
MD56bcc1d76beec28e98e91a1325dc5f3fa
SHA1b261663a696b9134874124ba34e3843f7810c580
SHA2565ab1f643d98651d111b5bfb1ba64fc6667bc36e115124681b80e70565b632849
SHA5128e61f981ed66db783b4a25a548a06b3f8723328508c5203df47f1eaa488ecae9a63647f41e25a88816e62039646fe137e66f7cdeb0e24212f9f1002679c953f4
-
Filesize
141KB
MD5277d340f72230677314555e255fe9892
SHA19a5c66f5fd83bf4a11cad95fa5af20ad942347d0
SHA2565af08d0953bbd254ba3a7b0c1a2086586ea3171f1cd78e3bf0f7484e18aaf58a
SHA51264b76e6387be88ccbac755640b284e5e41e74751f61fe67b5b2ea314bbd7d1e2650570a7ea37f51979d2e06678dd40b39b6f8e9cb85f4d62950fa6af54d8aa63
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
5KB
MD550016010fb0d8db2bc4cd258ceb43be5
SHA144ba95ee12e69da72478cf358c93533a9c7a01dc
SHA25632230128c18574c1e860dfe4b17fe0334f685740e27bc182e0d525a8948c9c2e
SHA512ed4cf49f756fbf673449dca20e63dce6d3a612b61f294efc9c3ccebeffa6a1372667932468816d3a7afdb7e5a652760689d8c6d3f331cedee7247404c879a233
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d
-
Filesize
9KB
MD51d8f01a83ddd259bc339902c1d33c8f1
SHA19f7806af462c94c39e2ec6cc9c7ad05c44eba04e
SHA2564b7d17da290f41ebe244827cc295ce7e580da2f7e9f7cc3efc1abc6898e3c9ed
SHA51228bf647374b4b500a0f3dbced70c2b256f93940e2b39160512e6e486ac31d1d90945acecef578f61b0a501f27c7106b6ffc3deab2ec3bfb3d9af24c9449a1567