Overview
overview
3Static
static
3FRIDA_V1.zip
windows7-x64
1FRIDA_V1.zip
windows10-2004-x64
1FRIDA_V1/FRIDA.exe
windows7-x64
3FRIDA_V1/FRIDA.exe
windows10-2004-x64
3FRIDA_V1/G...es.dll
windows7-x64
1FRIDA_V1/G...es.dll
windows10-2004-x64
1FRIDA_V1/G...th.dll
windows7-x64
1FRIDA_V1/G...th.dll
windows10-2004-x64
1FRIDA_V1/G...re.dll
windows7-x64
1FRIDA_V1/G...re.dll
windows10-2004-x64
1FRIDA_V1/G...es.dll
windows7-x64
1FRIDA_V1/G...es.dll
windows10-2004-x64
1FRIDA_V1/G...v4.dll
windows7-x64
1FRIDA_V1/G...v4.dll
windows10-2004-x64
1FRIDA_V1/G...is.dll
windows7-x64
1FRIDA_V1/G...is.dll
windows10-2004-x64
1FRIDA_V1/M...re.dll
windows7-x64
1FRIDA_V1/M...re.dll
windows10-2004-x64
1FRIDA_V1/M...ms.dll
windows7-x64
1FRIDA_V1/M...ms.dll
windows10-2004-x64
1FRIDA_V1/M...pf.dll
windows7-x64
1FRIDA_V1/M...pf.dll
windows10-2004-x64
1FRIDA_V1/M...es.dll
windows7-x64
1FRIDA_V1/M...es.dll
windows10-2004-x64
1FRIDA_V1/N...on.dll
windows7-x64
1FRIDA_V1/N...on.dll
windows10-2004-x64
1FRIDA_V1/R...rp.dll
windows7-x64
1FRIDA_V1/R...rp.dll
windows10-2004-x64
1FRIDA_V1/S...xt.dll
windows7-x64
1FRIDA_V1/S...xt.dll
windows10-2004-x64
1FRIDA_V1/S...nt.dll
windows7-x64
1FRIDA_V1/S...nt.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
FRIDA_V1.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
FRIDA_V1.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
FRIDA_V1/FRIDA.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
FRIDA_V1/FRIDA.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
FRIDA_V1/Google.Apis.Auth.PlatformServices.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
FRIDA_V1/Google.Apis.Auth.PlatformServices.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
FRIDA_V1/Google.Apis.Auth.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
FRIDA_V1/Google.Apis.Auth.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
FRIDA_V1/Google.Apis.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
FRIDA_V1/Google.Apis.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
FRIDA_V1/Google.Apis.PlatformServices.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
FRIDA_V1/Google.Apis.PlatformServices.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral13
Sample
FRIDA_V1/Google.Apis.Sheets.v4.dll
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
FRIDA_V1/Google.Apis.Sheets.v4.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
FRIDA_V1/Google.Apis.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
FRIDA_V1/Google.Apis.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
FRIDA_V1/Microsoft.Web.WebView2.Core.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
FRIDA_V1/Microsoft.Web.WebView2.Core.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
FRIDA_V1/Microsoft.Web.WebView2.WinForms.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
FRIDA_V1/Microsoft.Web.WebView2.WinForms.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
FRIDA_V1/Microsoft.Web.WebView2.Wpf.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
FRIDA_V1/Microsoft.Web.WebView2.Wpf.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
FRIDA_V1/Microsoft.Win32.Primitives.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
FRIDA_V1/Microsoft.Win32.Primitives.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
FRIDA_V1/Newtonsoft.Json.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
FRIDA_V1/Newtonsoft.Json.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
FRIDA_V1/RestSharp.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
FRIDA_V1/RestSharp.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
FRIDA_V1/System.AppContext.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
FRIDA_V1/System.AppContext.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
FRIDA_V1/System.Collections.Concurrent.dll
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
FRIDA_V1/System.Collections.Concurrent.dll
Resource
win10v2004-20240802-en
General
-
Target
FRIDA_V1/FRIDA.exe
-
Size
2.7MB
-
MD5
d5c11a36e9e4884119a6b4232321da6a
-
SHA1
3338ae2ab742411b7814a2e3a9028a9bc7acb160
-
SHA256
d7d05a20cc39eae526250af106dfc1c78d7372d888dca5ce55011cd324ccb6a3
-
SHA512
834e9627588699e5446329381766c8ec8cff4a9f992c7333db3daf9cc328857666d0a6970401f431a9a3c2a419afdc1b7fb948640d9cfac7bbe575ca5d493636
-
SSDEEP
49152:llLn2as+45eUyqP3eYlgp1Ox+qLmrNqxGo5AtnM5mc9tgs91IYh6vv0/Ounq7rsI:llT2asfujb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FRIDA.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FRIDA.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
FRIDA.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Software\Microsoft\Internet Explorer\TypedURLs FRIDA.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133714195173117754" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
chrome.exepid process 3624 chrome.exe 3624 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe -
Suspicious use of AdjustPrivilegeToken 56 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe Token: SeShutdownPrivilege 3624 chrome.exe Token: SeCreatePagefilePrivilege 3624 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
chrome.exepid process 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
chrome.exepid process 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe 3624 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3624 wrote to memory of 3436 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 3436 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 216 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 2920 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 2920 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe PID 3624 wrote to memory of 1104 3624 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FRIDA_V1\FRIDA.exe"C:\Users\Admin\AppData\Local\Temp\FRIDA_V1\FRIDA.exe"1⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:4052
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fff3b67cc40,0x7fff3b67cc4c,0x7fff3b67cc582⤵PID:3436
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,17190320900914056207,14460316217083272614,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:216
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2192,i,17190320900914056207,14460316217083272614,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2440 /prefetch:32⤵PID:2920
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,17190320900914056207,14460316217083272614,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2424 /prefetch:82⤵PID:1104
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,17190320900914056207,14460316217083272614,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4780
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3436,i,17190320900914056207,14460316217083272614,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:3468
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4504,i,17190320900914056207,14460316217083272614,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3800 /prefetch:12⤵PID:664
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4832,i,17190320900914056207,14460316217083272614,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4844 /prefetch:82⤵PID:3568
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4864,i,17190320900914056207,14460316217083272614,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:2964
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2820
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\FRIDA\FRIDA.exe_Url_iur0jfsbdwrrfula1tvcrbyhexw41sy2\1.0.0.0\user.config
Filesize814B
MD53d98fe5f78acc73e0bab666d610901a6
SHA1317c352f7dfdcd58d69392005df687ab10c4ac68
SHA256f617cc50b9da4d16d0f6b9b3392e64c43bc128e90b0b87f721db840668c5192a
SHA5121cb4b2ef893ae33a95eccab7357e0768b8bfa9e1d975ea3297bcf88ecfe230cc58a06e557dbfe036d1a476d2dfc166b3ec95cddc4842377781a438584e21c701
-
C:\Users\Admin\AppData\Local\FRIDA\FRIDA.exe_Url_iur0jfsbdwrrfula1tvcrbyhexw41sy2\1.0.0.0\user.config
Filesize940B
MD5327b7d2c0a5b3dff8d721b0bb02c2a93
SHA1fcb798ebe58ebee90f75e9ba89197b8fb3146166
SHA256056bab358b547380399a07259e5fabd74d15eb95045b8ca04ec4daf57cf1c6cf
SHA5125b03366d058143d811201149a5c3f57ed9744422cf5d65bf8ac1b0e760c259bd888a2e4abe80487c17e64042a625dd6826c92b90089a36a97c2a9bded6430022
-
Filesize
649B
MD57aa1e685d509530bcbfdf5a4cf25806e
SHA1a1050930f7ce8c1723ddd176c449de0e1bea2139
SHA25626aa22aee4ab50d8a05950e44a4025c0eedf033e291bbc506c4adb4ab6fd697c
SHA5128f09ebad0426993f04ada03bdf1b2db9e6de31f27d0e78482f3f4fce02cb462c8cf221491ced0257e16927ce9a1ef0de47a6398b8e00c7d4d4c44589e5348bc1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5c348c17226ef2dabcbb972bc5aaad476
SHA140f9bca4283091ccac727b240b0e140c58a3df27
SHA25646e42fcd79e556654cb74970d55162f81549acdba23d1c738864b36d6e3c8a53
SHA512d914b25b9cffcab972a94157eeb7fc7983aac63cb47a6889229987e8be78545b12ad66335fc691c12e5e335e7e233009d5901368800a875535fbf2e23084a5ef
-
Filesize
9KB
MD5d4f7053960c727c77b419d7919c50ec0
SHA17f406e1109404105d16c876498c60543eb7a9a40
SHA2569898becd982ea6f7ae38f6b566a562de3e1a0f9667ff2f8c43f22f6e37a8ec34
SHA5123bb8af8b2d0ee4821d5feccde62735bd6e2c8f25e533aaae4920b15e8d98deacad02b8259718ae74819e876694df45a99c7de5d8e8732e10a1f82ec49dceb664
-
Filesize
9KB
MD559334dae21b9d572396c0e2ec529a91f
SHA179d4af7709d8dcb83ed2c173cfaf47bc7b544a40
SHA256e329e721c97f3ea73182c57f337efd7e76f15953dc88dcf5233771a2e8be6ac6
SHA5129d3f2ca7aec35f3d4d4719095204237e02a1def98db9cf2c52ac0a611dd429107a45f9ebe6d48db2bfa185abb6d003649582d0b7705c6e6572f11bcbbdf72f82
-
Filesize
15KB
MD5766483c4b891e7528ea5a10887edf79a
SHA11b8b48f6cfed5fb1c22b1758b60594459a1ddf49
SHA256b2f412fe2ebbca0282bd013547556f23abdf514a061a4206acc3c58a193b2556
SHA512ebb555e1705981926e12047e2bb87f6c3fe7596e38bb7940f8385dfaeaad85414ce91bebe6ab3530602fcfc21aa38de26600fbe65f26539ae9b7843eb63047dd
-
Filesize
211KB
MD548074e534ef3750d30cb1c259d325988
SHA12d246211d13ff2c35dc8eff2008f7bccbc06bde2
SHA256edcfb9d8a82b30e5be807bb1966d4e1daa53f90849dafbbf9d18259459ce96d2
SHA51288dbf41a9ca89b25d5819142d4a17ac954cb084203ed65d8ba6463a8ed8576c5242cb8a8c10f2f55c2d66536ca9c01fe7b7c8a1741d0d367d881d6ddfa19d08a
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e