Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
7Lunar Clie...er.exe
windows11-21h2-x64
4$PLUGINSDI...p.html
windows11-21h2-x64
4$PLUGINSDI...x.html
windows11-21h2-x64
4$PLUGINSDI...app.js
windows11-21h2-x64
3$PLUGINSDI...uts.js
windows11-21h2-x64
3$PLUGINSDI...dle.js
windows11-21h2-x64
3$PLUGINSDI...min.js
windows11-21h2-x64
3$PLUGINSDI...ons.js
windows11-21h2-x64
3$PLUGINSDI...ics.js
windows11-21h2-x64
3$PLUGINSDI...nds.js
windows11-21h2-x64
3$PLUGINSDI...ies.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...der.js
windows11-21h2-x64
3$PLUGINSDI...ils.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ate.js
windows11-21h2-x64
3$PLUGINSDI...ler.js
windows11-21h2-x64
3$PLUGINSDI...s.html
windows11-21h2-x64
4Analysis
-
max time kernel
299s -
max time network
299s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
11/09/2024, 17:15
Behavioral task
behavioral1
Sample
Lunar Client - Installer.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/app/cmp.html
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/app/index.html
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/app/js/app.js
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/app/js/block_inputs.js
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/app/js/libs/cmp.bundle.js
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/app/js/libs/jquery-1.10.2.min.js
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/app/js/models/notifications.js
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/app/js/utils/analytics.js
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/app/js/utils/commands.js
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app/js/utils/cookies.js
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app/js/utils/modal-events-delegate.js
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/app/js/utils/strings-loader.js
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/app/js/utils/utils.js
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/app/js/windows/cri/cri-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/app/js/windows/cri/template.js
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/app/js/windows/finish-with-recommended-app/finish-with-recommended-app-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/app/js/windows/finish-with-recommended-app/template.js
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/app/js/windows/finish/finish-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/app/js/windows/finish/template.js
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/app/js/windows/main/main-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/app/js/windows/main/template.js
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/app/js/windows/modal/modal-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/app/js/windows/privacy/privacy-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/app/js/windows/privacy/template.js
Resource
win11-20240802-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/app/js/windows/progress/progress-1-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/app/js/windows/progress/template.js
Resource
win11-20240802-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/app/js/windows/settings/settings-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/app/js/windows/settings/template.js
Resource
win11-20240802-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/app/js/windows/welcome/template.js
Resource
win11-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/app/js/windows/welcome/welcome-controller.js
Resource
win11-20240802-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/app/progress.html
Resource
win11-20240802-en
General
-
Target
$PLUGINSDIR/app/cmp.html
-
Size
5KB
-
MD5
d7b8b31b190e552677589cfd4cbb5d8e
-
SHA1
09ffb3c63991d5c932c819393de489268bd3ab88
-
SHA256
6c21e8c07ce28327dca05f873d73fe85d5473f9b22a751a4d3d28931f5d0c74f
-
SHA512
32794507a4b9a12e52ceb583222cb93300e38c634a72ea3f51a0189127aba60cf476fb7918942355a4f826185d7071e876cb40348ba34cf5d1ca7e9546ccb310
-
SSDEEP
48:t9rc0/GLAoShbEHaLKNGiNQtvmolOGR36tgtr/GTvJP8AscaV4LiMt7ByBZXGz+p:4VLjHa2NGiivmmpWsBVutFwAk5vSG
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133705485616179136" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe 1528 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe Token: SeShutdownPrivilege 4776 chrome.exe Token: SeCreatePagefilePrivilege 4776 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe 4776 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4776 wrote to memory of 1532 4776 chrome.exe 78 PID 4776 wrote to memory of 1532 4776 chrome.exe 78 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2192 4776 chrome.exe 79 PID 4776 wrote to memory of 2620 4776 chrome.exe 80 PID 4776 wrote to memory of 2620 4776 chrome.exe 80 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81 PID 4776 wrote to memory of 4280 4776 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\app\cmp.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1fd0cc40,0x7ffe1fd0cc4c,0x7ffe1fd0cc582⤵PID:1532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1936,i,17128325906148845757,17639725301979385819,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1932 /prefetch:22⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1380,i,17128325906148845757,17639725301979385819,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=1968 /prefetch:32⤵PID:2620
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2196,i,17128325906148845757,17639725301979385819,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=2220 /prefetch:82⤵PID:4280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3080,i,17128325906148845757,17639725301979385819,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3100 /prefetch:12⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,17128325906148845757,17639725301979385819,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:4936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4524,i,17128325906148845757,17639725301979385819,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=3980 /prefetch:82⤵PID:2056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=212,i,17128325906148845757,17639725301979385819,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4752 /prefetch:82⤵PID:3904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4600,i,17128325906148845757,17639725301979385819,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4560 /prefetch:82⤵PID:3444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4692,i,17128325906148845757,17639725301979385819,262144 --variations-seed-version=20240802-050153.822000 --mojo-platform-channel-handle=4560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1528
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2772
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:1824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\4000b742-0218-4fb1-8faf-7a79d05897ab.tmp
Filesize9KB
MD56ce2d09c5d95c1eae8c5d97fb5ce0452
SHA17d1c48006c179745f4e644e1dd06100d4c0005a0
SHA256c6c760884931ced4d3db1bdedae8f90d5b79b5fe30dbf6102399015101db9052
SHA512badee426e7ef2886dd6083517470ba58d451c75e22dea527cddb34197ef5de92f305ded6a668104b0c851a3b068c4b85f51eb67aa2166ae959962a6c7ba3ee01
-
Filesize
649B
MD50908a64e30e71774e4c7cca3d079745f
SHA1bebb01a842184d91b1b3441fffd21a990f36d8a9
SHA256e7bc33c487c903504ecc15f91988f3552aa3a10a3893a4a77128081f49aa0ad9
SHA512430c3a3c570e66d372b9b334e31e4849aef8cc183305f313bc0930cff90dbe2aedd1b06ec9c2ea84ee72c47d5b5ccb8d8356c332f3bd11198aaaa5fee10c13c8
-
Filesize
1KB
MD5be2929de4817e9928cf8db88ba1e2993
SHA1cd058b1c11e5a401a41a53a155c60f771dcfc9c7
SHA2564673521a30dff811836cd0bcfd3a1d5dff09e8dc012bdae3fe4221d8c3b2dfab
SHA5122e0f9bb068fd4c31a27189f789500b2b27f4477b0be3f8a030d3ad1a43abc7f8fd106b0dfdad213d7fdde7fe8a4a8c3231efa995bccc792c825d7ead35ce2ae9
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD512391398d4a66a201ff1e2845840faab
SHA1d4c76b4fe51c957b44002d175cf54780e8054ef6
SHA256d39b6b991aeac4784c485be58385d4dc4b8c2dfe017c5b27ac5fba0d734c0962
SHA5128235d4d6fc7042e69579b9ca694776bcf461a13b09bcba0cd3bd6831a350f1c4b0c0db14d8f77429a3c0c37268ae970703c2a5db2d8a72dc6e423c0ef1f0a748
-
Filesize
9KB
MD51fd02791702e8a67f6094029b34ce516
SHA1666147c17b6c4ad26d76a0d5ca94369a222477b3
SHA2564efccd9780799de37bf0e2eee12bbc511773272e9f0ff99fb6f10ee90587d08b
SHA512b81a0724549e98a706163926836f470117ca805827eca7904bced895b43a5fb77a19d96bc95e4d3221ae43f3e9fbcb666072128089363a12e17c205f68654a89
-
Filesize
9KB
MD5effa1dbe78cb951677210ccab20ea391
SHA17706819f8deca9a3a1fe6d6f66d134b1eda7583e
SHA256ec0e1a83005f0c61f78f7fdd2099f2831032f8bc191c88d3b7cdbcf5330b2504
SHA5126acb87884e9dfadda7019ea455e271250483b3718b13e8c08fbdc12a24ee97d3c7a25ebb7b261d2fe846e86136698419af0a91b12dcf0244745cbbe95014276f
-
Filesize
9KB
MD5e9db7ecd6aa976af45a21e7710ffb45c
SHA1ab09033a5a0bc3f5e6102b36e23a6678aabdacc8
SHA256a12579c5c2966a507b71e762635fec0477385db7b2e14aaa68601c59e2b188a9
SHA51261d33a5254ceb60320a712eb92762d46c83d0ac33daa6342cf1614c74edc764f5013969bd5a56241c45f70827e667c5c09c357ebeeaf10d3e81f20d8d025d9b1
-
Filesize
9KB
MD530785cdbcdd09b890db4b9823feabc69
SHA1737e7ef4e69fdeed50b9c855bb7ad24f262e72a9
SHA25654f3563bf8f0818c74cbf6c3c688b4de65f56ac2d8ddbfe8f1d8089e4b6ed9c6
SHA512a4b529b03522e38d4731c6ee3715cc3f577d99b8679206e4391a355ba3433dd38cd0b23ceed3b69d76dc92fb7a407e615164f316edd77e0c4025a433d9080bb2
-
Filesize
9KB
MD5c211fbd657f97d38c7e89cbe913b937b
SHA1b8b4f0acb7113588a7c2c18643689023c34afa73
SHA256b4d9fa3b191a4b7a5dc935bdfa20dee09e10a9dafa6e4373350becedfd74e539
SHA512ff77410ae83c51034c71fe58358953fc73cc59eccf74b4d6a055a477ec44c9303e3ea7a0fe0b3cd2569f5d3964bd174c986407292ea8f390dd23cfed27e4a15f
-
Filesize
9KB
MD53dc1bb349a8e3457908b546dcc91affa
SHA1c1befb679156a0a811cf6241ddf77dde35f115cd
SHA25621a65c78eca6d3bf3c8b5d12ed0adfd0f87051b7a3c615aa8924ef84a0653ed7
SHA512122b34736a5d148faca0b65e19dd1ccf50bddcf8a4c26c6fe3272708e069818a64dc5f6b2ff83f8a611945d551381adbc7657f7f90afd4656e5762ad7be0165d
-
Filesize
9KB
MD5b019428ff7e49b125dd983ae5cac57d2
SHA1fd605658fb88e848b889aea61228a89ba4ccba91
SHA2560217186f0499c675eb8718630af1ed0fc0a5053b24f1e2c771e604d47bc4c855
SHA512a3c1c254b62ecdaaf0c0b04606e181476464903c39bce7ccec41eeec5c06b5d073f89583904239a9ef5e73b9a456772150fd0f27aca317e3f077bb7e9b85648d
-
Filesize
9KB
MD531ce2b9a04d3c5d45e05e202a5649034
SHA18ab6b267f98b6a597d5d5302d45ba799ba7c0019
SHA25671d5f8be121964bf0bd7f8035bab4449bb3324ab1bce9b234c25e7413ade71c5
SHA5127434cbc0acdbfef4bd7f00cf8467ac6c41c764be57debecf2ddf3eb9d5d81a4a6a39d0979c793cc11ee3fd08f72a82f276a3ddcef785716bf44fac57e2b65e1b
-
Filesize
101KB
MD5ccd6e16b119d354633cd045ad0a4772e
SHA145e3b80be1efc7717cd79e47d3424c7996adc57e
SHA2561f2e8f521e161fdcd79d2e7abbe12399e7164052cf0627cdce731accc78692f1
SHA512c84b4ebd8137e6dac504a41d601a66657f35d460b5bd3cf54df49741c8bb452a8a0ba9cf840795ba52422b06af40f8098e2c366a9a1d0eee0bfdf68068dafbfa
-
Filesize
185KB
MD5d64e2099c1c2d2324334db5daed83a2a
SHA1557d4c0c14ab7c798bc4812c0b577cfa05b63289
SHA256ebb1ea031d6646cbee5cd0ed583f08f812b12783486f15bae950e56f8fa5657a
SHA512e9d69d6cf5dd7e880cf960322ba1611ebbfc0a1312579cf42ffbd58a229be1e1576d04c56498e4378ab0e6e6cc37d4a30003874b1b4125c0731778fcf30582b7
-
Filesize
101KB
MD54695eba980ba659ccb25c28f7ea39936
SHA1cb24864b0ef83447abb5a24373a72b1d19935819
SHA2569752674388d8b42270ba4549ee89e4f3578b3a30aecc886f3012f35e2b8bc760
SHA512cc93e12b0e9b9fe0a99fdd1f7d2798b366526e3fea3f89871e70636d32d3f23b98c4c6572788702201ec2e509eef0e3f747232bad213e559f313f0c003923ca6
-
Filesize
101KB
MD5fd3001fb799fc6da6d103345a43d80eb
SHA1ca7db88f655b0fa70a23a76c512213584c54f262
SHA2560e94fda0a64632eea223139a41d3c646ee67f45a13b55410afa2cc49b83f11c4
SHA512e33cb38ef026d16ae91d57ba0f08f1190c5b792455a72594aafb56523df9167fc90a34942160b921834cc82dd728062975d47004a6969cebb7a30ba9b616a5a7
-
Filesize
101KB
MD58b08ea921fb74509034d3b1a778b6db5
SHA1d39e9ca6b1b55a528bbd5e5d5b3e36e34542adfc
SHA256894e1f59c3e339886a4d4399a95cf0cd1f9f1940709efb42c770fcc73c29929b
SHA51253d942bdf3de5fbde1ef68259f8ba0d029dad17110121069338fc3e5733d67eacc8bb43f5e679b1563472a4435189a964d8292d9c0906fee3f381a30b44e481a