Overview
overview
7Static
static
7Lunar Clie...er.exe
windows11-21h2-x64
4$PLUGINSDI...p.html
windows11-21h2-x64
5$PLUGINSDI...x.html
windows11-21h2-x64
5$PLUGINSDI...app.js
windows11-21h2-x64
3$PLUGINSDI...uts.js
windows11-21h2-x64
3$PLUGINSDI...dle.js
windows11-21h2-x64
3$PLUGINSDI...min.js
windows11-21h2-x64
3$PLUGINSDI...ons.js
windows11-21h2-x64
3$PLUGINSDI...ics.js
windows11-21h2-x64
3$PLUGINSDI...nds.js
windows11-21h2-x64
3$PLUGINSDI...ies.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...der.js
windows11-21h2-x64
3$PLUGINSDI...ils.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...s.html
windows11-21h2-x64
5Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
22-08-2024 05:52
Behavioral task
behavioral1
Sample
Lunar Client - Installer.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/app/cmp.html
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/app/index.html
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/app/js/app.js
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/app/js/libs/jquery-1.10.2.min.js
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/app/js/models/notifications.js
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/app/js/utils/analytics.js
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/app/js/utils/commands.js
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app/js/utils/cookies.js
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app/js/utils/modal-events-delegate.js
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/app/js/utils/strings-loader.js
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/app/js/utils/utils.js
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/app/js/windows/cri/cri-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/app/js/windows/cri/template.js
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/app/js/windows/finish-with-recommended-app/finish-with-recommended-app-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/app/js/windows/finish-with-recommended-app/template.js
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/app/js/windows/finish/finish-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/app/js/windows/finish/template.js
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/app/js/windows/main/main-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/app/js/windows/main/template.js
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/app/js/windows/modal/modal-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/app/js/windows/privacy/privacy-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/app/js/windows/privacy/template.js
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/app/js/windows/progress/progress-1-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/app/js/windows/progress/template.js
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/app/js/windows/settings/settings-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/app/js/windows/settings/template.js
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/app/js/windows/welcome/template.js
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/app/js/windows/welcome/welcome-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/app/progress.html
Resource
win11-20240802-en
General
-
Target
$PLUGINSDIR/app/index.html
-
Size
20KB
-
MD5
423d2e2f7e21b856cb5f3ee3dcbfa5a0
-
SHA1
eda0e357387913daf57a0c683c34b4b8a5d7baf7
-
SHA256
cd59efa2fe7cbe222d03a946c34eaacdb3761e922763952d7be4555addf8572c
-
SHA512
c403307549af9bf7cfd34295a8b1020e7b7489d104b5fdaf4320b495f85977134796774dbf4f20f8fd0b2d1f2188b881a1cc35cec56aa64a3dc84bf1c2d21b4b
-
SSDEEP
192:DgNb/cVDYmPkhHmY74deqmtRCtmK8WQI9gHcMlxh8Bi9LJFHab4rmgJnc5t/93jp:ENs+XaMr9n2uLy05SN1
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe File created \??\c:\windows\system32\driverstore\filerepository\display.inf_amd64_01cf530faf2f1752\display.PNF chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133687795684439704" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4568 chrome.exe 4568 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe 3104 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4568 chrome.exe 4568 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe Token: SeShutdownPrivilege 4568 chrome.exe Token: SeCreatePagefilePrivilege 4568 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe 4568 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4568 wrote to memory of 1208 4568 chrome.exe 81 PID 4568 wrote to memory of 1208 4568 chrome.exe 81 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4688 4568 chrome.exe 82 PID 4568 wrote to memory of 4776 4568 chrome.exe 83 PID 4568 wrote to memory of 4776 4568 chrome.exe 83 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84 PID 4568 wrote to memory of 2164 4568 chrome.exe 84
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app\index.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff88781cc40,0x7ff88781cc4c,0x7ff88781cc582⤵PID:1208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1812,i,1635485262022465657,11824689086070569228,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1808 /prefetch:22⤵PID:4688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,1635485262022465657,11824689086070569228,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2092 /prefetch:32⤵PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,1635485262022465657,11824689086070569228,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2384 /prefetch:82⤵PID:2164
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,1635485262022465657,11824689086070569228,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3080 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3048,i,1635485262022465657,11824689086070569228,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4732
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4408,i,1635485262022465657,11824689086070569228,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4540 /prefetch:82⤵PID:2868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4568,i,1635485262022465657,11824689086070569228,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4724 /prefetch:82⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:5056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD52d63f5e978932998819afcb1c67dcbda
SHA172de8f34d8a0b85ebba4528689cb73c635545ed7
SHA2566e3b97726d9855db52111cc66fd718e90dc7a669bbbfd9121854d30260f51836
SHA5127588745189acb0340c60c42ea9ab7ba0cf8e2995d857150eeccb37289abd8480aafd29ab0f134ef8113c14193fddcf4576da685a25ea2cb36bcfc310b694f0d5
-
Filesize
1KB
MD55f1702253bbf1974656922026fabe896
SHA106f1afd4d5a7faa7c79b2cb7e58ab582a38f8b9f
SHA256e1dcfb1f8cff7ff0b2269bd10782d74a3aa604da98f615873811652ab4d715f7
SHA5122a79c4ccb21e2d1e790080350416c3673327ac4978a32f0ae5026fbe0e9b6aedc04c196bd51a173d3095796e3bf81acfc62249705168362ddbd842f9bf302a41
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
524B
MD59000ff99bc93b893d706ca83a10bcedb
SHA119ef6f72ce659e6537b4fbd0271bd95379438141
SHA2568a56c0561826cb33e630aabe7eb0dd750cce2d1478a7f1f89a25a1757605414e
SHA512a5ca73e6960e9e08c9253859830e85cd1fb1da7a90c487c1c801ff221f37b2740ceb33e2ea158dc43e22996256e2a24167a842ccde6e5fef97de11f526bc8ac2
-
Filesize
9KB
MD5bd9fd5d722b9c89166bfe6394a37b8ae
SHA135d0f0259133b226b50f939e7a15b881a48de704
SHA2569f1cd895fbdb11045b54c52c90e5123f1370f5a7aaac6b6a2d5351734b82ddca
SHA5129524299295e160344afb35076ddf3d9fed331eb59d80f7d1c5b8dfc331a1aafa19cee691707be903363f6aaf0b1e6fbca057d257bc79338c72e224bb7c38d393
-
Filesize
8KB
MD53bc61f69e7dec10bc32a81d236300802
SHA15e04468cd1b3c3d56e4b17b9b95cb7de38830ae8
SHA25620d8844b9e306c3199d117219249b2f69a0665617dae18e8bdca9ded08becd32
SHA5126ea5c534501fb359abc915d1c0744c011df870414a4a277aff3dce9b98c0a6f120fd311f9297f480e5465c1b962595b185ff46c1522731c5ed07a8c2ead730fc
-
Filesize
9KB
MD5b540fab594a7d479e004375630ea2d24
SHA14daf0e94425f81b531f0984172b4dc787cac2093
SHA2564a8b15293eeb36865b9f33845331a36a5a64d753c942d746d4a6fd9d6eab7878
SHA5126834544b41e2e645692a4825c3d6c54d5de506db284355c57437b2d466392f0e567dc73d3b1ab15f122ae206af0b906122166d2b2f9304510b8c51de90567073
-
Filesize
8KB
MD5e4b524c3b88dd36b6edfc11891af1497
SHA196896313dbf38232e0f1d7c433a2568d6f7f3c3a
SHA256a4e35fa541dacc2b8bf523489d92791dd37c247630c35cb8b3f1ce4a7523823f
SHA512e0562e13816aab45c8b3b1693c6292196157d7441b867049c1ea71fd62f673e19e00359b4367bb7f4f4b36761ff62afe2d4b7e95e136980899a0d7a16004eea1
-
Filesize
9KB
MD5496029c6e2aad45f4d9228655d575be2
SHA175b4b165e7bf8dcc294160b97147628dd54a0ddf
SHA256a56a9d511bc20f968defb275661ad2e24d38bb500d4d7a5e42a8dcf41fcb9e15
SHA512a14ee41a277b86b4881c841aa68d9e8083e640ef0cbb34b820a78c416e93e7d51364c6331a76cce1c57e755b8ec16f0fa0f1cd0ccb46774d8fd518be2d9aafb0
-
Filesize
9KB
MD58c45d87437549a28500b48238868db7d
SHA18fb6f6442f24f2d1f4d2fb550d4578b40a5b5db5
SHA2561efb2435c3798e78372d53d74dc86e00eff7246b81854278ddbc648bfbc96a3e
SHA512ac872c7b562673cbf73e324273d76e756021c2a67976106765f2b41fe720a79550a5224d3ba626cca647dff9214618c68b3bef3f1cec74ec61bffe37664c4197
-
Filesize
195KB
MD551bb522910e41b46fe3d9688a0c5bb1b
SHA114db20084f98114debac605dfc09564c31147983
SHA256a71a684e8f437ac1749c8b7f432f2e6430fe5233ff33fdf9b45be40339073bf7
SHA512883ee504b6b4857dcc1d0dfc84348e95d3ca97d2e52a8fa2541eb6755e1c56fb7a6bc20230e15d40ba76d275c99bd6eb18039142691644f09dac8bc523473bc9
-
Filesize
195KB
MD52401220e0f11d2dc98fb323df1d1f356
SHA149f5da29a8f2e02dee606977f92a33fd08caa19b
SHA2560508c8929e9e93c64506d2c531c6258458cd8270c1cf6f8f4f839077f0ae62e5
SHA51249534897f48065abc659af4cf90a55042dd6b717d601f17fd4bdc9db1cdf8eb10404bbfe514d75cdeebf396ad7ac4640e70a07f707ee616a8af0b6fc8966491f