Overview
overview
10Static
static
100123b26df3...09.exe
windows10-2004-x64
3022432f770...03.exe
windows10-2004-x64
3048c011323...59.exe
windows10-2004-x64
30c722728ca...56.exe
windows10-2004-x64
32106b6f94c...fc.exe
windows10-2004-x64
3263c18c860...93.exe
windows10-2004-x64
327e02b9737...77.exe
windows10-2004-x64
32911be45ad...7e.exe
windows10-2004-x64
1047f3c8bf33...b1.exe
windows10-2004-x64
3516c81438a...4e.exe
windows10-2004-x64
35d66919291...99.exe
windows10-2004-x64
36204957505...75.exe
windows10-2004-x64
37299026b22...69.exe
windows10-2004-x64
37322fbc16e...b0.exe
windows10-2004-x64
3960ce3cc26...63.exe
windows10-2004-x64
399f510990f...ac.exe
windows10-2004-x64
39ee50e94a7...42.exe
windows10-2004-x64
bd8c106856...9e.exe
windows10-2004-x64
3c6e6698065...9a.exe
windows10-2004-x64
10e309a7a942...f5.exe
windows10-2004-x64
3f7b1aaae01...27.exe
windows10-2004-x64
3Analysis
-
max time kernel
599s -
max time network
602s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
0123b26df3c79bac0a3fda79072e36c159cfd1824ae3fd4b7f9dea9bda9c7909.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
022432f770bf0e7c5260100fcde2ec7c49f68716751fd7d8b9e113bf06167e03.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
048c0113233ddc1250c269c74c9c9b8e9ad3e4dae3533ff0412d02b06bdf4059.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
0c722728ca1a996bbb83455332fa27018158cef21ad35dc057191a0353960256.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
2106b6f94cebb55b1d55eb4b91fa83aef051c8866c54bb75ea4fd304711c4dfc.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
263c18c86071d085c69f2096460c6b418ae414d3ea92c0c2e75ef7cb47bbe693.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
27e02b973771d43531c97eb5d3fb662f9247e85c4135fe4c030587a8dea72577.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
2911be45ad496dd1945f95c47b7f7738ad03849329fcec9c464dfaeb5081f67e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
47f3c8bf3329c2ef862cf12567849555b17b930c8d7c0d571f4e112dae1453b1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
516c81438ac269de2b632fb1c59f4e36c3d714e0929a969ec971430d2d63ac4e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
5d66919291b68ab8563deedf8d5575fd91460d1adfbd12dba292262a764a5c99.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
7299026b22e61b0f9765eb63e42253f7e5d6ec4657008ea60aad220bbc7e2269.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
7322fbc16e20a7ef2a3188638014a053c6948d9e34ecd42cb9771bdcd0f82db0.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
960ce3cc26c8313b0fe41197e2aff5533f5f3efb1ba2970190779bc9a07bea63.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
99f510990f240215e24ef4dd1d22d485bf8c79f8ef3e963c4787a8eb6bf0b9ac.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
9ee50e94a731872a74f47780317850ae2b9fae9d6c53a957ed7187173feb4f42.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
bd8c1068561d366831e5712c2d58aecb21e2dbc2ae7c76102da6b00ea15e259e.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
c6e669806594be6ab9b46434f196a61418484ba1eda3496789840bec0dff119a.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral20
Sample
e309a7a942d390801e8fedc129c6e3c34e44aae3d1aced1d723bc531730b08f5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
f7b1aaae018d5287444990606fc43a0f2deb4ac0c7b2712cc28331781d43ae27.exe
Resource
win10v2004-20240802-en
General
-
Target
62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe
-
Size
55KB
-
MD5
7be1483472153324066babf71c683045
-
SHA1
4436a1c572737a82494d4ddfe91929ce4cd836cd
-
SHA256
62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975
-
SHA512
5e0b75f6e3b493d44f29379df4a7b314a266afe7dc121d09eccd801f4a591210b8b0d5b19173c210c9bd89d5abccf82dafe44694cff3596b8f1e2a9398086fd1
-
SSDEEP
1536:qzwshK8pUMGxo0xwwW9VemFMGfpbbVDYANyCa:wwshK8yMexbW9vZVDYANs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133709132164689056" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
chrome.exechrome.exepid Process 2608 chrome.exe 2608 chrome.exe 4908 chrome.exe 4908 chrome.exe 4908 chrome.exe 4908 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid Process Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe Token: SeShutdownPrivilege 2608 chrome.exe Token: SeCreatePagefilePrivilege 2608 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid Process 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid Process 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe 2608 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid Process procid_target PID 2608 wrote to memory of 3176 2608 chrome.exe 102 PID 2608 wrote to memory of 3176 2608 chrome.exe 102 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 2068 2608 chrome.exe 103 PID 2608 wrote to memory of 4020 2608 chrome.exe 104 PID 2608 wrote to memory of 4020 2608 chrome.exe 104 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105 PID 2608 wrote to memory of 1204 2608 chrome.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe"C:\Users\Admin\AppData\Local\Temp\62049575053b432e93b176da7afcbe49387111b3a3d927b06c5b251ea82e5975.exe"1⤵
- System Location Discovery: System Language Discovery
PID:948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4156,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4060 /prefetch:81⤵PID:2284
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffe9fc3cc40,0x7ffe9fc3cc4c,0x7ffe9fc3cc582⤵PID:3176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,4269156066212246655,4270082230938986069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1920 /prefetch:22⤵PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2192,i,4269156066212246655,4270082230938986069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2224 /prefetch:32⤵PID:4020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,4269156066212246655,4270082230938986069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2260 /prefetch:82⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,4269156066212246655,4270082230938986069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,4269156066212246655,4270082230938986069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3848,i,4269156066212246655,4270082230938986069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4400 /prefetch:12⤵PID:2444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4540,i,4269156066212246655,4270082230938986069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4712 /prefetch:82⤵PID:2256
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4784,i,4269156066212246655,4270082230938986069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4924 /prefetch:82⤵PID:1984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4904,i,4269156066212246655,4270082230938986069,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4816
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3828,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4088 /prefetch:81⤵PID:4888
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ec4d97062f7635a49b7f822e0895cd1e
SHA1f37fa0f0e7444c1dc548aae5e7d883e7e588c242
SHA256054ea646460e97f4876b807c67dec3fb4319a691734fa75f9c481100143398d8
SHA5126fdbdd0533853fc86e006b6b5572e1bdddedfbcb7da9dc0f6200872918ace90fe2c52588e87b5e5ac20292768890a90effffed2a42fba8e7a47b28ce3e116c97
-
Filesize
1KB
MD5fda6c0c87ea1abfd1c3eb42b535b82bd
SHA19cc5b7dd77735b0854f567d640c1111ce937bfb1
SHA25691bac6ca2391424dc1e28131fb75c235f04ddfb4151366b81f1b7fa1c1664d0a
SHA512655ef0b9a37f5548fd9c450942282bf1ecf215fba77c7efe63a82be1332c6054aeec7829601589c91a7e569a8fde0de85152e688e5c057e8899388dc9c9cc48e
-
Filesize
1KB
MD5c5be95c1a3ed21408c167ac005610916
SHA177cbb13dd7f83eadeab4437c100f3f380bb63362
SHA25631c46b8ccf3719a5162c9757bc1f063de03245b5b9192af14278c1d485519020
SHA5122959611451feb7d10cc709ccbeec2b2ad0ed6e65df5b8e2420303f7105008d3da290bb6d57f0fbb7457c9987b142a6369673ce1c3345e6f72034ada64148fad7
-
Filesize
1KB
MD5c9bf7f2b6e2b65fbde5d17cf03d64ef1
SHA17df0e5c5aab5d2ae6509b7e6afd460c496cc811e
SHA256201ca707622ca9ccaa805e6400f081031b21879fedaf997b2377f6d58f798dc2
SHA51260e5baa250582edfaf9d43847b3e6aef8271f4a6a49ca71c296fa407d03d97573be06c4a67e84b636e22c58b3266c4997ba309e2899871389acf0d60b774f47d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5933c70d1593a7c3d04498691e23edab0
SHA161370bdca12b0d2a5308fc3c06fc9f23ba74aa86
SHA2568699a30e8ef32d3841e544cd52131f82f35f5bb7c08e97a56777b88ba5a80eca
SHA512c26edc9580d459ef1301ca4c8932f4e04fc02b84d235f2557035b836c0c6d907b33da8a83bba0eba6b0c436795f3b3bfac8ffedb304b19b483038ece28e5f379
-
Filesize
9KB
MD581bc3ae0fb311a5d9674be6ed2f0332e
SHA1cc20a89200fa49ad520137fcd1d259f792dd94e6
SHA256fa967b3d0166745a27bdfddbbd50a36b78749aabebebd22971d25a46218959b3
SHA5126762f1e69e2b76cf36026dc9d7909c2db95bf0d341f399890d0ab19855958baf731bba0247e008905d483a8957d2a6440af8cb3e04e3525d84d267b66408b2b1
-
Filesize
9KB
MD5f812f24467734b63e34193f3d294aa97
SHA1e0436ba2660bfce38ce3cc77b5a019071a5225d2
SHA25690de1b516d69310224062b2eb3f5a3691d94cd61cdfe9af444797a74a016f680
SHA512b4e814a3f0860933a1a37196f3f6e7664871b00c73ca00dfdefa784c9f9f0ad8a3d0e375315f1f63f912a960e4be1093ca37fac9a3d04715528012b15cba43fe
-
Filesize
9KB
MD5ddfeccf960c706810253b089b174d4d7
SHA126db1ee43395e95afe92488b45cf9959122f1efe
SHA2566f08416d8e21d7b5e42db6557f3531cc6ec2bceb68aef31b9696341ae758dbc2
SHA512d3ef8a991dd0a6809f2658ed423cc18f21269eaa266e55078c87bcd7534c410389de515def83550d40f55599e5910b0af9e1fb30e6fceb90e0548154f269cf27
-
Filesize
9KB
MD591cd5cb8d834d56a26065af8a70668e2
SHA1151b78b1ce1e1c85870fa5c8884f2795805d2175
SHA25612b4f9d25413523fbad9b34d43c2803045a7c320f73121f17beed0b4a6c5a3df
SHA512c79ce4853b6fb9b83c815656b6de41312768fd177f94f498805dad7e9e1d60dc13e89fb574383468d902cd0f31b9daffa465d330222b10714648cad400ccb781
-
Filesize
9KB
MD529b280c54c2abd6164e8d9614b3852fd
SHA1b593dfb51345a662b719a51d103b3372551c205b
SHA256a65dc01540a2e19f825cf929b39f8ea634e956a86eae423512311e82b4d1eeab
SHA512c7e136eca4ed037fb973981e338514a72bcf29436fc7363bef6f68488f5a1102485b97f96fcfddb38fdbd31f4587107c932173ab99e72cd66590101e02eaebd6
-
Filesize
9KB
MD574e0cc2a3676079cf8e19834665b6586
SHA1b4a7dd56b3cdaa714ed292ceb4eb635908cd1148
SHA256f11669ea7ec28475403ec813d86894442b2c0048e06e3f5914418fa19c475bc8
SHA512bb59242d0f0f7f0966d4cd8cbfd9f4081edff0f647dad6a33ab90e7d232be602a420f595d717e51f679ce7d969a223f987ef08d20b217040eeb4495de6d5b4f8
-
Filesize
9KB
MD5ce3240e24819951bb25da134ecb5d9dd
SHA1906be756038c3e1d25884183c6d8afc81e714aab
SHA2562d2c12faff640ca90c11b8428690619d63b6b06f5fd1edd3206350078fe61cc2
SHA512e1c6828d357a85fa1198f6f933b00ea0bac5fba7f80f6a12a809b841bf720e773f85f08e17f58a54bc268d61e63cbd52fb601391ff3d378709bee82184eba9d6
-
Filesize
9KB
MD5137ed50196e90eda039f52cd8488c583
SHA12e9840b45108a24977cefcf76db28199e91432dd
SHA2562fa246a105b793f75250701ea327ed4dba61f92867ef159db93ad1b31b4b6571
SHA512cd8bbb7047bdd76c1b7ee176e5bb73c02452ae873e671d71fc588cd0038dd0a87f88bc8ab71fea214e7f32fdf8ba8b9093d6578418a9d0e28ac528d661f31283
-
Filesize
9KB
MD5dfb168f76c6f36c06d8794075661314f
SHA1a8240ce6d740fefc33c020faa5c5874d3e468856
SHA2561c12d40aabb84a2fae458ae182619e79e9c437354d1a86833d951d486bbfb7ab
SHA5124b55b9cdf0d64f85c2aff13d080ba1a2b2b6d74030cc6c8f0ab3df09d13d728cefd89c2130e8e304dac1f03db1b8c6e708633348f1283c912c74a6fc637cd47f
-
Filesize
9KB
MD5ad3f88c1361ba862f7aa2d9fa7b491ed
SHA1c34a7c5fd1ecd3eee482963fed74bb7adaaaaa44
SHA256f90404a068aca3ffa13fc656af789b9008eaeb2233a1b336f99754ea8b1c2444
SHA512b09b9dde4b7302763a37e52964108e282ca74c804a09800a490b9a30ffe1ce9025c3b23e87367223c3f9d498bd588ec1ca54f17ca0df616feccf1c65dd0b0c1a
-
Filesize
9KB
MD5ecdfc535bd0029483ad0ca1a09f20ea6
SHA1eff112186757e873beb9796c85dabc5b5b347318
SHA25678872a9db73b283ced4f9a7e391f75e9259e85f94ff694b7a9674452cfdecc47
SHA512e6fcc71005eb0802d6b3dcdaaf4ba13d5797758bec5fcd95cf7c996f4b747a913ee6c76eb117e92e91546a476412722ca2e806e6cfa93a2095451b64365cc906
-
Filesize
9KB
MD574cbd5797e44016fe67b7a1e5564d68b
SHA1dbbd9587ff39af3efe112aea43e7a82f9dde78ca
SHA25655cb429f57862b0aab75598be91537e418b732e8aae4800227f2a964112a7abb
SHA512f469518a73875d447ac9653dad39d7d507fd177bad0d6341aa6e8d2fd967a4b1abdee781d097bfdad381de5fba2cb6a404396fa3a7f63d1bd8d9ea918fb50d21
-
Filesize
9KB
MD5c7593b8f64514b0d0ff23bc84cb112ae
SHA19f474439fe27160a705482a433f887cb83c40aca
SHA256a6f78f5129ca8a2790ce1080b0a3e41f7ff738e3c53a34b242df0ed09716d216
SHA51297a48d8661da5f1727eabbb2832effc31f837c09a6f9e6a779a6daf10fbbfe1e6d413c2f7f43f9ee0dbc2e6b1bedd1b22215aa80f72af756b19e00be81dbfefc
-
Filesize
9KB
MD55dc591d364136760f2c0fa8ac2a9091f
SHA1fa7f4fdfe6fc5d545612724288b3eab0af73b7cc
SHA25616830684fcaf0c8eac453bff422eef20b782c058d316978963361c590d89cba9
SHA5123005cebaf9e87a10af5ff8702a7b965c5d9840a2fa14c68d450fc62fa22c3d95dcc52b6edeb7578df2613beb2a830f6521c256e3c8bfee77e2bbe9b9624a5f63
-
Filesize
9KB
MD527384f90a5de6f7625c5388ab633a7df
SHA1f8452d8d247adcb2bf2a66691b006008c1bb8bbd
SHA25639de774f8a8789f4340673f621af36a74f26844a48e7b664301ebb155ffb097d
SHA51215ae77bcd7737199312cc608bc26bbeb4d2e301d6c1edac5a2e0f6dc8bb435e15a672d1d11d66576a289eff06c50a3ea8e7f6c3e70f67a635b5d09c5f51ca645
-
Filesize
9KB
MD547dda202fb1450a9f920c1df890f0644
SHA1f758471df26a905125b0a1703e637965f58dd86b
SHA25652ab730056ccaa1dfe2fb202c55d329b5dd2b790fb98510cc0ce2d59a4e6678c
SHA5124ac4dab85eef2f71598edfdecee71b3180f5f3787093951c432537689c94239b5e094c76e8c8890d5f41dfaeae8df1ab1db842ddcff98327248ec06d01119e06
-
Filesize
9KB
MD5d8a43bb5e6ed5663005ad8b305b94774
SHA1a87a6732045875b024f34267d63b14f722f019c1
SHA256d6f157781082ca95e0cf27e74585ee5f06de57b024804ca7f0341aafd30b94b9
SHA5127e92141a4c5946474d7d43d0f720f58f95d3c5ab847d14dd27a2e8daf007831b39e28221ce5fbdc1533d07af84c4cd87464c13ae66db43301dea0da362c9e01b
-
Filesize
15KB
MD50dc648e92d89156b2d9bdb447b782d2e
SHA109924b8133f06aa8ebd7b701625109234a5e585b
SHA256f753636470038a66c8e7efe6b63b546fbf545fe4b773827f226f59e187f1f25c
SHA5121aad978d77f73e64308d845797bc1e931b948d7e503013b5c9d931b7f4a3c39c4ea96141ab336876bd648d4f28272b561d367f77e7ebd69c437e823d76b23b1e
-
Filesize
208KB
MD5f114dc739bf08571452a2c978edaf237
SHA1085a3837f2936632110f3d12caa93482fba26f9e
SHA25694ddc80d852ee1600e417e16f4e840bc4722e80c0e73f58b249800b6d76034eb
SHA5123dbc745e05f8188ffbffe02cbf3452a68a59d2e4e2e535ae3d35236747bd1bb535d41cc4c8f1129789dd5c8c78744388466f1eaa7bbdf10dca17a330b90e7181
-
Filesize
208KB
MD58be96a27da5934a6820aa6629df9a3b3
SHA1f20bda6379b3e2355368ea68750df213a1ff3b88
SHA256abf765e49775660cee51400e8c29fd46c28f77517c3b38d9a68b8d2898eec0f3
SHA512b6cf2e9a0fce26db00614064c65a6acd5ed195afb1493ad663dcf224ca1739cb86929e893cbbb465db33a23d8076dc369b8cdb62f3035988e89988610b33b7e8
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e