Overview
overview
10Static
static
3Mono Execu...ox.dll
windows10-ltsc 2021-x64
10Mono Execu...I2.dll
windows10-ltsc 2021-x64
1Mono Execu...or.exe
windows10-ltsc 2021-x64
1Mono Execu...re.dll
windows10-ltsc 2021-x64
1Mono Execu...ms.dll
windows10-ltsc 2021-x64
1Mono Execu...pf.dll
windows10-ltsc 2021-x64
1Mono Execu...le.dll
windows10-ltsc 2021-x64
6Mono Execu...ta.exe
windows10-ltsc 2021-x64
3Mono Execu...x.html
windows10-ltsc 2021-x64
4Mono Execu...ain.js
windows10-ltsc 2021-x64
3Mono Execu...bat.js
windows10-ltsc 2021-x64
3Mono Execu...fee.js
windows10-ltsc 2021-x64
3Mono Execu...cpp.js
windows10-ltsc 2021-x64
3Mono Execu...arp.js
windows10-ltsc 2021-x64
3Mono Execu...csp.js
windows10-ltsc 2021-x64
3Mono Execu...css.js
windows10-ltsc 2021-x64
3Mono Execu...ile.js
windows10-ltsc 2021-x64
3Mono Execu...arp.js
windows10-ltsc 2021-x64
3Mono Execu.../go.js
windows10-ltsc 2021-x64
3Mono Execu...ars.js
windows10-ltsc 2021-x64
3Mono Execu...tml.js
windows10-ltsc 2021-x64
3Mono Execu...ini.js
windows10-ltsc 2021-x64
3Mono Execu...ava.js
windows10-ltsc 2021-x64
3Mono Execu...ess.js
windows10-ltsc 2021-x64
3Mono Execu...lua.js
windows10-ltsc 2021-x64
3Mono Execu...own.js
windows10-ltsc 2021-x64
3Mono Execu...dax.js
windows10-ltsc 2021-x64
3Mono Execu...sql.js
windows10-ltsc 2021-x64
3Mono Execu...e-c.js
windows10-ltsc 2021-x64
3Mono Execu...sql.js
windows10-ltsc 2021-x64
3Mono Execu...php.js
windows10-ltsc 2021-x64
3Mono Execu...ats.js
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
899s -
max time network
845s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
25-12-2024 17:32
Static task
static1
Behavioral task
behavioral1
Sample
Mono Executor Final/Debug/FastColoredTextBox.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Mono Executor Final/Debug/Guna.UI2.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
Mono Executor Final/Debug/Injector.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
Mono Executor Final/Debug/Microsoft.Web.WebView2.Core.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral5
Sample
Mono Executor Final/Debug/Microsoft.Web.WebView2.WinForms.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral6
Sample
Mono Executor Final/Debug/Microsoft.Web.WebView2.Wpf.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral7
Sample
Mono Executor Final/Debug/Module.dll
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral8
Sample
Mono Executor Final/Debug/MonBeta.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral9
Sample
Mono Executor Final/Debug/Monaco/index.html
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral10
Sample
Mono Executor Final/Debug/Monaco/vs/base/worker/workerMain.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral11
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/bat/bat.js
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/coffee/coffee.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral13
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/cpp/cpp.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral14
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/csharp/csharp.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral15
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/csp/csp.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral16
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/css/css.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral17
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/dockerfile/dockerfile.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral18
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/fsharp/fsharp.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral19
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/go/go.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral20
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/handlebars/handlebars.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral21
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/html/html.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral22
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/ini/ini.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral23
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/java/java.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral24
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/less/less.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral25
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/lua/lua.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral26
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/markdown/markdown.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral27
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/msdax/msdax.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral28
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/mysql/mysql.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral29
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/objective-c/objective-c.js
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/pgsql/pgsql.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral31
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/php/php.js
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral32
Sample
Mono Executor Final/Debug/Monaco/vs/basic-languages/postiats/postiats.js
Resource
win10ltsc2021-20241211-en
General
-
Target
Mono Executor Final/Debug/Monaco/index.html
-
Size
1KB
-
MD5
efd81d18eef80e7a5cc70db71d658067
-
SHA1
98b0b7b9c738705263d92b41ef9f810a2f2cd849
-
SHA256
38df7c585f0775d175435305f709b7418d60a98e17d542299e2ccb35c4cd2726
-
SHA512
9a46cd4abc069ad2c7247863c6e9a29bf546f47150ac41feac448bf8d092672e42033e386dcb55a80d9e61c79458cd8589b5587b018e0fe852fb13dd8053b4d4
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133796216144699343" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2668 chrome.exe 2668 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe 3664 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2668 chrome.exe 2668 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe Token: SeShutdownPrivilege 2668 chrome.exe Token: SeCreatePagefilePrivilege 2668 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe 2668 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2128 2668 chrome.exe 82 PID 2668 wrote to memory of 2128 2668 chrome.exe 82 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 2212 2668 chrome.exe 83 PID 2668 wrote to memory of 4524 2668 chrome.exe 84 PID 2668 wrote to memory of 4524 2668 chrome.exe 84 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85 PID 2668 wrote to memory of 1636 2668 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Mono Executor Final\Debug\Monaco\index.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffa6500cc40,0x7ffa6500cc4c,0x7ffa6500cc582⤵PID:2128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1740,i,6829016498214081202,11972944350927426197,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=1568 /prefetch:22⤵PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1900,i,6829016498214081202,11972944350927426197,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2064 /prefetch:32⤵PID:4524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2280,i,6829016498214081202,11972944350927426197,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3112,i,6829016498214081202,11972944350927426197,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:5020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,6829016498214081202,11972944350927426197,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4604,i,6829016498214081202,11972944350927426197,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4616 /prefetch:82⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4760,i,6829016498214081202,11972944350927426197,262144 --variations-seed-version=20241210-050121.637000 --mojo-platform-channel-handle=4832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5621743739cd33efda1d5d2155ab9df69
SHA1516d3efd9d66da142b55f6bd25adbea5c6e1271b
SHA256c353206844fbafbd14f269548bd544ab816a68700f679876971b938bc0a89967
SHA5123e5faaeaeceb7a65d3883c619bbd688eda0b32634dafc598a0a093e289aeecfab74925230a1b1376b5924e5b525f8baf11bbc0cd320e9576bec519035616b4aa
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
8KB
MD5d55dbce14b2458ed8da992d41a23bd17
SHA1935018f7df6e7889fa205ec6203bbd0538bdd2b8
SHA25669a29657cc42253a0dc3c3a019331c52dc6da00c210f5c2b1995b90f6986de49
SHA512defe4a6d74b15f965a7322c8aac48a63ab54a79765287fb36eb18aaad7e4060bd98c5ef2837ceb7f3300a4f9d2cb5aaa405f24e60bbccac2f8c4b033c7e7bbea
-
Filesize
9KB
MD5f73ebc102020720cc5090045c0e949c3
SHA1deb82acb3a922a3f97561023c908bc26b62ebfc8
SHA25607a1f4bb518a456bcbed354d811720b14cc075ac0139e995ad4939cf8087461b
SHA512d00791fc78715343af92532da8c8e37d54f743cb957b4f7e86bbaf61c38e37aa657a35e642f2a6a4ff563225aeda5502e138d04ec69a62f70ba10d374c385092
-
Filesize
9KB
MD5f501c4f4aefe2fb65d26d593df5c7c87
SHA154ea3be6c22a4f547f62c8b372f8f3e53053f223
SHA256f50b84e0acb86c19b3ae6ef3f5d2a27f77e1d33078c8688b160a75ad2f8835c3
SHA51269d3e7485ed563901638544bf63adb6bd18adf561bd258194113479c1091ece73ddf18753ce3235c998d79e310fb52f2d98e43bfda361fd3f03c66c2ff93088e
-
Filesize
9KB
MD5c0e16eb403d6af7a76038843c2334d7f
SHA1681d75de118cf742c4e58a738ffe2e76dbd2a427
SHA2563cf235549be7b03c5d84f9b63846a2247b5ae61307e7ce5b2b3673af0163db98
SHA512a3619c825214a50553a17b1e608d93ceebb12fde4a51e0dd1983c0aa3239400612f564aea07e3c4ae643c068b4d526eec71d43e59507d35bd89b7bf3e5da20ce
-
Filesize
9KB
MD575a47c0e5c7e8f0657bef8c6a87a75ef
SHA1150ae36fd8c1c05a18291984afc05e7b967bf0c2
SHA256822e9ce32b96b329a5fb70a6fe42a34c3cfe708ef401f2846d6c2eda31a1d891
SHA512cee375e64d1a2d329f9169cd73b997b93fe5142edbb9173d7334091fc3b96d261ec3c14f24240564664b3f4f73e58c2a714f987579fe3687330c5869dd00004e
-
Filesize
9KB
MD5e485c8e26bf259bb08308fb0eead4e3a
SHA15dd0ca9ad2c2e95846fde6f0d3b9486c28f5a3bc
SHA256e1f0c2cbd21bdbd1623d6ced8c63e8e2e92da665e936dfcbb58645d032856cbb
SHA512a624aae0fa4d3739b576ecb6d7b02d7c47cce87d0fe14931311daa3ea0f2cea4765ad5b9fcf4a39750432c95601b8873b9d4ccb2bca47840d9b3f9416b6cacf2
-
Filesize
9KB
MD56ef21b9e63f5324def482c879e6a2469
SHA1ddc9242c30b949413c5547a6390da597d2a9260d
SHA25607c29b64d7098fd8b7bff43685255072ee9772c97619183402a6787bf492e896
SHA5121a97e1d497b5b4cc134587cf152cba8d2ff6fc855dfea7fcf1fda3e93a1712f40972f2138b16690ebaddb01d01e658dec097517ac0093b2c5531739ae461b2f0
-
Filesize
9KB
MD52b3ded2ef35ce1d4f06920e0d76b91f5
SHA1e2efcf4ce49201f505fd562aa0272d4f01de9810
SHA256f0b0b63369154ce592f655382facedf6fd9f5c24fb96843705878d921b90a302
SHA512d075676a7271b4d6f88c047d30cb713f37182ce1128c19f3044868ad266877e728932fb50f826bf39c558df6a06d7a48eae74c010214bcaaa24c51987a603c42
-
Filesize
9KB
MD535492a7c0a11062ab20ce163d7623656
SHA171a63f4aee17a2e4bfd6c56ad9792781efd76637
SHA25614a391c4a8d13c8e8b54fd1bf89791525afc8ca02b37bc47974d6decc6848be3
SHA512b943e277d7e5c89b4e7e79e7ff66f3acea866ba17e73f0f37e8c4d42d463ec3f7007709d89d4ebe0b8c6ca5f58d333e42d6db3c796ece5962986bc42fcb15308
-
Filesize
9KB
MD595eaa3392aaa142f2d46e2348bb33838
SHA164bdc16f20e85e1f8007d19b5f83045b0f0a2478
SHA25618853b3070f6f8757f930b9851d55568e8f9fec5159c92b9cd1d10a954e8b714
SHA512e388e3f756f89805791ebca2202e490c220f5a29cda725f6dcb1aaaadc7741d12782a58e6271376c1bce59e6ee51eed3ea4916af7860c7ac853062d54f7b7a3d
-
Filesize
8KB
MD58c4723a9495ef7e2799392a587928c50
SHA1a8702611e7d6b871aa30644e8597756e0b0e2ff6
SHA256bf04f85a853c41d6f26b26f522b665bb2ad8066f4ad3a2f8f6695e3691c4f963
SHA512566bc7e193387eda8df67a14c1fbc6a1f83766f0b00095011d154dd42a5c87a6370146bff6b5b641cec657f8e31164ca540d6022cd8805df4a43ee66652258db
-
Filesize
9KB
MD538c70579eb76db6de1a70fab20e5506f
SHA1e910b320f84985596322b8040700b3acaad871fa
SHA2560506aae62070a5724ef69b720d8a6e7853fa86a3ed46bb4fb204a5f5e57faaa3
SHA512e758f17b9089e5825b79ec549bd860683cdf6d42f3b1b810df81dcd0b5ce9fb1b28a6d4c8d663ee583d9677b4378af79bf18eb5a47714d48d86fb1984572bcbf
-
Filesize
9KB
MD5258deabd1a64869e89b6b69db1bee21b
SHA1d253ebbbe8705fbba8b8576ff82c9a4729657ff8
SHA256768d8a360f1bd8f635766bdb2a0847088fdf5a48d2cffa2ad5dfa2554f432ffa
SHA512914b62d625ba0f341edaf268d7a9879eadb23f4dfbccfd673de5f76af49df93051736d8dfdc08ba53ca377d963932e4fd947be9979dbdbddbd0a65eccacf4926
-
Filesize
9KB
MD561d8ff79b1aa06299599e703b0d798e6
SHA1b49437435e1250bc1b77c9b768ebf1781ced9515
SHA256c491089a18ab12b62e4c69811f2e3462c36996cd84a103fd21b448cbb4e3b10d
SHA512837191b010926d995a6d3d448ffb9f67a0fe543d4de9c5a09112cc6feb19d637a5878d6546517c71269e4281b5a1362429af4baeee729699eb818a2bb03bce89
-
Filesize
9KB
MD5b91a889c150180bb4d7387b699fc9808
SHA110670f12a2764700735a84abe716ee98d7d53c5f
SHA256da86a99f872c164110f2f579ebc1a294a0f480ecb48abb69a6b27403c6484480
SHA512a8cd02eb9bec03ec248fdc4388494943f55018d28e4334d97b09545b78ea2f5e00a9bb19602d37087cb0b6bb9f3f9ac447f9e3ddb3f83e37d29698aeb252067b
-
Filesize
9KB
MD5085ba9447e9093dbf1b730a72162b277
SHA15aa83ec5a15607f967bb32f746cbcece69685200
SHA25661760d4aa4e88a52a6e0823acf4b569f1452dfe71de977f7e1a95ac4d409604e
SHA512e73b5ab8f6d490982d736fa84af62ddd4d0361990a33d9974f2daac57ecbe7578610f06c7a1d25efd0b7cfd946b5fa2f704b880186afda63a6d5f889fa5d1e4f
-
Filesize
9KB
MD591fd582bbb10f477ae3c63dfe0b16f4f
SHA1fc1c8d210422239e6cc0ac77754efc0fcb09c209
SHA256b7f6fc8b4a99cd06a05ad0bd6624ee1ad390e857a535b313f9c30cb012caad8b
SHA51224856f0693571f9bb44d313c2815433b3dc742d40a7b29752b07fccb91771c61a21da6ae6cab24e5d33616b2f3b72cf383980c64491daf60c906650698ef137e
-
Filesize
9KB
MD576a08573fef935948e282a0b09bba8e0
SHA1500be705817832a215655679254722e3c8c87d70
SHA2565a19d22b189002a87aa08ad3dfacf66349df1d096cfdb2fc24e00b3ebc7cde83
SHA51262e9573c58658f57c014162363f13d4c068df923b220677bd0ee645011d3dafd626586df88c9dc26d5a8922594a6059b6774ba41b42ec0d0295e2fa6f39c1d02
-
Filesize
9KB
MD50ec51a8322e9aa562022980e83d602bb
SHA117874b3ea6a7f3dbd30b7d46627cf3cff2c5e869
SHA25699aa94cb8f61107461d2b30763b950c4abc9413b4b23c945a90bb73d3600eefc
SHA512c0d3f05f4bdf52b1f695ab9bfeec028a5ea534bf097fe222d34bd8fcbac81f9bf0da0d69d948ab9c6e5689d6e5cc6c6c2760d760559918ed55a4943e2dd6eb60
-
Filesize
9KB
MD5283b5c953288d2db5b7a79852f4fb42d
SHA1ea8375b91b3b4298e73635d4d6c51565e10e3e9d
SHA2563e0750f0cdf9a3c15d6591883904f15ff2db7e00b97a8b3b9343c5cf5145b5c5
SHA512c589851145d20efcbd41c09490d5ae9938bf6eb90b50b7e6b145617efb5128f01b3256cb8ffcf1d91e1d712a2578942b432c894ce94788016a788c9aacdfc41c
-
Filesize
9KB
MD5944e517bf057a313282f22524dd69b10
SHA183377744b621ee0fdf093daa25061c6096eca194
SHA25672236c43bd6b00acf7ddb5006fd9628de98bc3b9aa2dce92582add96807a1c44
SHA512ada0102d7207ae03787da36a771ac67952d41e96ab1882f6556b13c91863423de731346e2b743ab5ef1af48011b2e9e1868ccff6175292185aba49d897439f44
-
Filesize
9KB
MD5359577c966bbbfe93e28627c966115be
SHA11cd12feb96fde8594ed8279d1771589fffba4ffb
SHA2566af3b0c593a5a0e57bbae7a130e7dcac2f466dfb4a434738d5d2af765cd22d1d
SHA512711caeb8809c57cb560c23714dfac8db5db9bdb8bb9712a80dc1b5128db3f6f5d1e43e4a33190b08bc6fe498f9ee39f5db50bc54ef0fb9211226885fa3771836
-
Filesize
9KB
MD5eb9dbc6b2e2210e562bb5fef740fdcd1
SHA12c0288d04b45d8278491104f7d338b7d41608a2e
SHA2562e92504cf9417eb1c97ca8c0285d78799688d2688c99d2b1149f62501b7cf7f8
SHA51256650fcb4c80fc3b2504953b2fe376beb3143599c2ef53b42250b4166b8b2cfd8528b319c43e5c4ac460351ea78d1de211e46c3dcabdcfa36f6202e6e8c3a116
-
Filesize
9KB
MD5c6113f75769fe24c47701219cf03d4db
SHA165b13a7d2ee96a0f23ae251e9f66818f96e03142
SHA2569ec403e4efcd8853e32fd8d944f35244f67de90ab30e762a8cca21a6690c4784
SHA512c170a1836a24e9e8a5f2d10602e17f6b8346307bd5dcc1b70686d075a6bd09a976f57df9785c972825b82a0a2bc157c4dbd149f1257e0c5fa2830334c0f6d2d2
-
Filesize
9KB
MD56ee9c1109f549087fbcaaf299aaead3a
SHA1d57dc2c8e93c9cf213234c701ceaf11b291c4002
SHA2562f00cbfc8ca30286c679120360d025b42571e5fe0c2cab45fb2311f1c494c6eb
SHA512bc927fb62662c0904f32d5ff8f54db0819550a4b798af8cdf39e932278f3732293e8f2e54a8aa6c61afcad784fbb53a8e238f00e75c1b598163f9cafb99a824f
-
Filesize
9KB
MD5a68b7f46df54d09f2eb6f41bdaa3c301
SHA12a57c42f0d4c595965e6175575d1daa695296431
SHA256e3858d472423ef81b8ac016d62b9932b1a54c0c93b60a21693fb94448441b909
SHA51215c00e9290e2713c701583c8fbf47cbe6b06822abb424bef397a9088d0abe9d64f924af9de9383d55d6e2bfe539bf4b39b9b494f248fa43933906b57e6db8d79
-
Filesize
9KB
MD5fc6e8c8cf4eda52f13a15fb8d3dc0e26
SHA14bc5d1ac0acb49a03ca846889be2814aa87a9227
SHA256da542d0815df04b3ff2cd0415b9a13764278b9c0b959036ba59eb8dc9fbf69e5
SHA512713879e64eb3ba92b9035e7b3f68d06c821b0091cdf9f0063d28ae2beb6ae8c001a052e24a8139f345709a1f53e99b5145ab4e8351b4b2cb1f8636feee30a1c4
-
Filesize
9KB
MD547d6d4921bd53a157819e6fd1f89f519
SHA1288ff00d39d484ab59dbcc8d8912ef0eab3dd5d7
SHA25613ccab85f1603e69091a945cd760d85c90acf6c56069a5944228b83344174247
SHA5123bb502329b3b42394a279046bbfc1ad79309641e5662dce395eecda1e8dd404f65901587375114044a09ac64ca35bc6c584480665c26b35026c26af62f31c1ca
-
Filesize
9KB
MD519d766cdbc0e6461d96d218674ecaf0d
SHA1eb3229644f6db503d80b94116a587107b99ecff7
SHA2568c87b143c36a96ee7a4876ca2241a04c529e7cce1b5ca4e6dbd00e053f854805
SHA5122d4d53f5dd26c60c56a33985950a5da7e694720a94553d8437d633b709d95be446b75755b11c2abb61640a6fe373cb21508477c18811aebfd87da2fe7f63a19f
-
Filesize
9KB
MD5e74d9a184e23c17b1e38c41a6ab2e796
SHA163d6109cc4bd143d5a39d9aeaa1d62f16ddbe6b6
SHA25668effd9bb783b67d9635ace46e6e59a48d96df84b68e82941039e28726bc9289
SHA512271d35d71c2996062f711bd4eb99d695b1912d7cdf821abbc47a1e52e2833296589fa53b9c75e47eda3313785ba99f25b9402314335529591d6de9e28370934c
-
Filesize
9KB
MD523064bf86025e8d5105cb738678bdb4c
SHA17359510a2e4caf99fea9bb8dd70a7b1fcaab8399
SHA25655a08ce269998113d5e40a14e9abf3b9674de16d2ebd239c05b5cb45b5c85f92
SHA512b4a376a5cc13db7ed630f379663533bdf3e3cce88ebdf25e661675628a4f0c9c194a0b688e9fd81344a4024b5010bcc0618d22ac9afa6a8c0ebc61c73ddef827
-
Filesize
9KB
MD5015e9eb66d06bfb278c796853e9fe347
SHA18e9df1d2b52686aae3d22ee6c50f5a1e1322b465
SHA2566bcd55d3422bdb1c79b6b2010fa854d1b996aa28b96057aac68ea9651bc1b633
SHA512fa8fd982bf6d7e674477a29668c5a432fa8a7fe7a89fadf58678470ef16fccbbce9f80d68e05fdba2a3607e005853a10c166e71490b408d166c2445f97095c60
-
Filesize
9KB
MD5d74435b14ee1edaf19d1af89f2ac8fca
SHA1ccb90faca6d51bfe204a8713593286b33ae5a671
SHA25623f9ea78ee965d557b2f8d4ec4f358c91c586b7b689bf1e632b3e5798d8c8e72
SHA51252d3526ff61aadb2b5728eb15c423cfafcfaa7c079dec66da0700fe010669406dd8bf61952b2b48147827d131f2d9463ff1f5f2acbbfb4d70574f7a2bb5125ac
-
Filesize
9KB
MD530008bc4fab8885e25cf48df1b2569e4
SHA1876dd5f0d23716c93db74600bdb5184d6121f6da
SHA256708d7336cb9c1070d53db6e5ad524396ad94a50d10d085216f6c44b66ef97d31
SHA512ad3e078a4fb6477f6af61d986a7550acf884e07d8ade346638b43c1e50f686fff788e48139814b58f9990efabf99535cd0abb5e1642af2fc91cf0602186c39f8
-
Filesize
9KB
MD5628e30c90ac404cd6ac3481ec1b666c4
SHA18d3513de4d7d3bcc8aa4399576c15e4b87e015f2
SHA256dd1642e78d2aabcd73c2ee371fc5914df8dd76368cf85226637f75c619973c8e
SHA512ea6c8b81ad63585216e7ac1f39729c8ecd5dfe074e7a1c687ec2291ffeb35772f5773d7bda71a155600591fc5a338e68eeed3e40ae3d63ad8d23e597a1f17ae8
-
Filesize
9KB
MD558dc5131b53409b258a17cd609c8ec5a
SHA111846be8e6aa82d8c21c84d9737ca22d2461114f
SHA2564f47c14955c86ead3cc605f59949420a23129173b0efcaa9a536ec1eaaab0e15
SHA5127aae90e0256a107250b948d226b8bda50b0616fe13465ef78f2442f3a625e071df673f8fa37417641be967a0756c6c57b21158f63f13bf18cf6986092457d95d
-
Filesize
118KB
MD56014903718e9a5df0ce697043aa1ef6f
SHA1f05140a0e6e24e8d5169a0f967be2d0cc60524a6
SHA256f31ead5e1d9a69b87a791f88c905e365b5499f9828c78f676d5342f269ecce3e
SHA512a70f38470ea8ababa5be0785d21ddb545a7c52ecd8211b406cd83ecfd78fae0ebab1e8e5d161003a50ac19b4dad0f5821cdf634e3bbb09b30a3b82d053e1e1eb
-
Filesize
118KB
MD57dd48eae79504e87a1f26e83a777f5ce
SHA1c5e3195a575086e3136ec1c016d498936ed3e33c
SHA256b66616e695e13b4aa2d2eafae68909bbc3cf4b8c5a71847a90746dd49cef87d9
SHA512df411e38d0172c479fedd36faac6072bf79b52d6bc6a7e992764492a8653edf98a69a67f31d279c91cbd5c1234982c770bacc12f64069f2830cb9670d271d820