Overview
overview
10Static
static
10VirusPack/...sc.vbs
windows11-21h2-x64
1VirusPack/...X.html
windows11-21h2-x64
4VirusPack/...sc.vbs
windows11-21h2-x64
1VirusPack/...st.exe
windows11-21h2-x64
3VirusPack/...sc.vbs
windows11-21h2-x64
1VirusPack/...t1.exe
windows11-21h2-x64
3VirusPack/...tub.js
windows11-21h2-x64
3VirusPack/...ub.exe
windows11-21h2-x64
7VirusPack/...og.vbs
windows11-21h2-x64
1VirusPack/...e2.vbs
windows11-21h2-x64
1VirusPack/...pt.vbs
windows11-21h2-x64
1VirusPack/...in.vbs
windows11-21h2-x64
1VirusPack/...ys.vbs
windows11-21h2-x64
1VirusPack/...e1.vbs
windows11-21h2-x64
1VirusPack/...ns.vbs
windows11-21h2-x64
1VirusPack/...on.vbs
windows11-21h2-x64
1VirusPack/...ne.vbs
windows11-21h2-x64
1VirusPack/...er.vbs
windows11-21h2-x64
1VirusPack/...C4.vbs
windows11-21h2-x64
1VirusPack/...PE.vbs
windows11-21h2-x64
1VirusPack/...l1.vbs
windows11-21h2-x64
1VirusPack/...sh.vbs
windows11-21h2-x64
1VirusPack/...e1.vbs
windows11-21h2-x64
1VirusPack/...sh.vbs
windows11-21h2-x64
1VirusPack/...C4.vbs
windows11-21h2-x64
1VirusPack/...ys.vbs
windows11-21h2-x64
1VirusPack/...Pe.vbs
windows11-21h2-x64
1VirusPack/...bf.vbs
windows11-21h2-x64
1VirusPack/...t.html
windows11-21h2-x64
4VirusPack/...me.exe
windows11-21h2-x64
3VirusPack/...n.html
windows11-21h2-x64
4VirusPack/...r.html
windows11-21h2-x64
4Analysis
-
max time kernel
900s -
max time network
882s -
platform
windows11-21h2_x64 -
resource
win11-20241007-fr -
resource tags
arch:x64arch:x86image:win11-20241007-frlocale:fr-fros:windows11-21h2-x64systemwindows -
submitted
18-01-2025 21:03
Behavioral task
behavioral1
Sample
VirusPack/Darkness.last.mod (2)/Darkness.last.mod/misc.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral2
Sample
VirusPack/Darkness.last.mod/Darkness.last.mod/Agent_X.html
Resource
win11-20241007-fr
Behavioral task
behavioral3
Sample
VirusPack/Darkness.last.mod/Darkness.last.mod/misc.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral4
Sample
VirusPack/Dbot.v3.1/MD5ChecksumTest.exe
Resource
win11-20241007-fr
Behavioral task
behavioral5
Sample
VirusPack/Dbot.v3.1/misc.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral6
Sample
VirusPack/Dwighlight_Stealer/Builder/Project1.exe
Resource
win11-20241007-fr
Behavioral task
behavioral7
Sample
VirusPack/Dwighlight_Stealer/Stub/Stub.js
Resource
win11-20241007-fr
Behavioral task
behavioral8
Sample
VirusPack/Dwighlight_Stealer/Stub/Stub.exe
Resource
win11-20241007-fr
Behavioral task
behavioral9
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Classes/cFileDialog.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral10
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/Module2.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral11
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/fDynastyCrypt.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral12
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/frmLogin.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral13
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Forms/mLoginSys.vbs
Resource
win11-20241023-fr
Behavioral task
behavioral14
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Module1.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral15
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/clsTrans.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral16
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mAddSection.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral17
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mFullClone.vbs
Resource
win11-20241023-fr
Behavioral task
behavioral18
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mIconChanger.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral19
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mRC4.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral20
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Modules/mRePE.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral21
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/Trans/UserControl1.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral22
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Client/clsBlowfish.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral23
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/Generated/Module1.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral24
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/Generated/clsBlowfish.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral25
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mEncRC4.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral26
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mLoginSys.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral27
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mPe.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral28
Sample
VirusPack/DynastryCrypterSource/DynastryCrypterSource/Darow's Crypter 2.0/Generator/mStringObf.vbs
Resource
win11-20241007-fr
Behavioral task
behavioral29
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/FBIClient/FBIClient.html
Resource
win11-20241007-fr
Behavioral task
behavioral30
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/FBIClient/Name.exe
Resource
win11-20241023-fr
Behavioral task
behavioral31
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/Injection/Injection.html
Resource
win11-20241023-fr
Behavioral task
behavioral32
Sample
VirusPack/FBIRAT_Fuck_Hack_Hound/Injection/Server/Server.html
Resource
win11-20241007-fr
General
-
Target
VirusPack/FBIRAT_Fuck_Hack_Hound/FBIClient/FBIClient.html
-
Size
70KB
-
MD5
4619ab753b634b63fce3614e1d59682f
-
SHA1
5b17a10dc1922ebc5b63f152d8641ef289e13291
-
SHA256
0c4d2a0e0853623208cf5184de28323a3b9545968673845e3215b039694a3dfc
-
SHA512
ed6b80cc8111f597f8298c11f8e19e306ff094259bc4026012e1fe2c0e5d5531c364b2f0947ff9b41b12de1d6cd10a0dab9d13326f9ce4d6f05f587802fec899
-
SSDEEP
192:gDzOJXNGYoJheMRO511mMTOZLZqQw+nSk8e3S8QDruwoezM2EaX2MwT5y4U5nS00:gDzOfGReWOxm0OrqUScShucMe2jyjST
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\INF\display.PNF chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133817090791078552" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2696 chrome.exe 2696 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe 2772 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2696 chrome.exe 2696 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe Token: SeShutdownPrivilege 2696 chrome.exe Token: SeCreatePagefilePrivilege 2696 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe 2696 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2072 2696 chrome.exe 77 PID 2696 wrote to memory of 2072 2696 chrome.exe 77 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 4788 2696 chrome.exe 78 PID 2696 wrote to memory of 3628 2696 chrome.exe 79 PID 2696 wrote to memory of 3628 2696 chrome.exe 79 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80 PID 2696 wrote to memory of 2700 2696 chrome.exe 80
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\VirusPack\FBIRAT_Fuck_Hack_Hound\FBIClient\FBIClient.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff85a91cc40,0x7ff85a91cc4c,0x7ff85a91cc582⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,4532739082207541379,4770023595948174351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:22⤵PID:4788
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1768,i,4532739082207541379,4770023595948174351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1936 /prefetch:32⤵PID:3628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2152,i,4532739082207541379,4770023595948174351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:82⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,4532739082207541379,4770023595948174351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3104 /prefetch:12⤵PID:236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3096,i,4532739082207541379,4770023595948174351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4292,i,4532739082207541379,4770023595948174351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4540 /prefetch:82⤵PID:468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=212,i,4532739082207541379,4770023595948174351,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3508 /prefetch:82⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4712
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD54b4123bd205d84567e4317bf9192a7b1
SHA165e2426f6b5f8e979aa0f30d20c866e1a87bdccf
SHA256ceadd8c2e7aa972a3b3dbe150511999878368009f43c2c1c4b13087a29a80176
SHA51223f6529eab841ad889a032fb46f7ee2f0be4879dd638ef7763b933ff843416f39e5e50043bebc0daadc81f4e9de01e5725328ed7f53b00ec797e0f61b904fe42
-
Filesize
1KB
MD5537c8fbf37f03882a7dd9a135116afae
SHA1a0aa225dfecec4774d75f608929cd2eabc8101e0
SHA256ff0809ef24cf2c578c9717c6c4a356dc5ff360414d9bea27e4c9c110110dc811
SHA51200359c8012cf41becfe520213c1241c1240ac16ed10a729ec54f4bf15d2d880e9b0bcdf764c661c81f675054f3f08c019dc46cfeab31355e97b3512da8d8b03d
-
Filesize
1KB
MD509c8f530d27da2ab59359a0ea6b4d05f
SHA19c3a6a79f1b0bf699f020aa19de6f068852b6e23
SHA256398d46c94c7b8e6f406c7baf4d51529d3b912a5402fcd35f8cbf86836d52ab5e
SHA512b90c2a5687da5035e6827822e41c587910bbc8f3d02d7e779a5996990e50c170fb2410b86a647c7a40c5cf6a775944cce937ca1047c3a412da29b0b1241a0db2
-
Filesize
1KB
MD5909c75838942f135c37e03b365b375e7
SHA19d24b11cb84eab1cd5cd818617ca7ea03e62e718
SHA256acf4e3338e470c8008580aabff2b8ec6d9aeeec9d58dbf56497450f372e2c615
SHA512dcdf2f5770eaeadfc8b6d8cb1eb9b40a4e96b9462a8f750cc04290f9121b49160cacd46247f08393de9e4c60a43729a92ce9cd3806ae2c0e4d79a1b0ada48096
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD5ff67673b8d5847c579d8edc9ce984aba
SHA1c3322592c2f83376783215de72dd2086500a3c53
SHA256b26f8b7af51e7187f3c7f695d1f994c8f6b6c4359e0437a524b4b23290b74e7c
SHA512f5ce718a53d4d5c01a9fa6a7d5982bdfeb0b0bb89cc97c6262e4b235f51829940dad3b51deb595e738ef3a7cc2357338eb822b22b935f19918d3296494d9e407
-
Filesize
9KB
MD5243c185c2445b02021de81c19a0ffdff
SHA18305f2a3b8e542ef62060a8ade333511c85025b3
SHA256701cc6d9340edcf4ab25d22cfd5dc53aa2d32215c817232da78ca042f7dbf99b
SHA5125b559ca09b2948d8aa807f28c5039de40c49d7c3b1add9ad89ac65e1fe98c191ad270b102e3c1059ddf5468fec6fdef9bbe342c107663f9b9f764be18d12a268
-
Filesize
9KB
MD5966e119bc160442ea9f618adbf0f5f15
SHA1e399e0c174f3c818ec8c900a4d7829ad47f93e0d
SHA2565b2c7f68ce15f6ecc328b77e7be1efc03aa801969e5f9aa9edf95577e395dfe7
SHA5125181b70c8213f88e51635c61b94f6f76b8a31717cd90e4dae9bbc78e369156375b74cb3e723a3461da3331851dc1689a32c3efeb3c65520b5e8068fa1ac8755a
-
Filesize
9KB
MD59b3465a9e524c292b0c9e826bdade17a
SHA1ff947a01c7aac4ae64249c1694a2a670b4c60751
SHA256459fcbe80741dc8cc18b052494bb7700fc85a3a88ad355b3cf97f710967e82a2
SHA512c4fece72de884a1ebc454d0db9791b4a0a37e6a95e781ca5a5d6a23ac4b3b7c9f3a63cb193ae5553a3887ce6a41856e9a639ac4f668ae7acbaa97e70fbafb12c
-
Filesize
9KB
MD596ca9bd04d9188426111f452024c4645
SHA14c8c10061c70fa0707ea8196e9a5921234e8139c
SHA2561d025ec1f442194cb5de6ed0cb35634c7856778b052ba9d0dd80502a84a0cc25
SHA5120aa8818acb857da126f3a5a23644ffec8b65ec729363b6196073fbdbc91e5d30396aecae8ae960c6e3de1f12248f8c54d9760e7dd9a765736154995097ca19ca
-
Filesize
9KB
MD59e29d4c921de07e04b3f3938aac6cf0d
SHA1b59c198eef4f3b0506c9775c097f6df32a8d2936
SHA25694a0d89aa6ec015a15d6e11d30f7ceba6408477eee23f1a3d9f154a7c46e2dcd
SHA5121626ddb5822b25d9ea9b7e540ac9c236c70566c22d9409e18b2e12879c5fc64e6831d121d7c2cdd32dd617cd5ca97746c4ce73b4b03b61a0f0afdeabcc6f0d47
-
Filesize
9KB
MD5c07433c95846420b89c6aef3b1315366
SHA1cdd88cd4eb2caad1402fdd2125ad6b9a3b6077ea
SHA256cd23cb59bbd60dc6f9e29797cef077bcf08132a8bfcb4bdc602c315754cbdf24
SHA5128b6f7864fc08b0cb4e8de1a46bfb0b854c11ad0e4e357c797732d037742cb9002dd5ef0f8561af47555eb0ce44930e4788301b43b61bb7260ebe90862f38d5a8
-
Filesize
9KB
MD5f707a1e1800407a782ec3f60b796702c
SHA16946c53939b2a6ae78cc72ae6354d79ee2096ac6
SHA2567cf43e882454f0328ae89177f6ee8cb5076234b57d64832c4a1a61afde80376c
SHA51257b9d11bfd885ac1d6beea1d60aec7bd5e3c4375425435bf4c53d0cad691b16d60ed67a503e4d3607436f5807613c7d4637610a39fda829e1a22b50ab3aa104e
-
Filesize
9KB
MD50027553c3f488b92d766873eba46384c
SHA10d345ffc89d52750b915b106e02f9ea6ea39bc37
SHA256dc25575567af16f66bc4ba25229fb3e832451f417dabc7f5d41f901b879d0af4
SHA5127ad6d24baf975d4a4de4f447beae065231cce6b209398725277c5ff5bec94d4d9154f2fdcdf6921292d89e552177cb62b92d66f130ca478bb782fb887b46994b
-
Filesize
9KB
MD5521be4e5a4194319514ef7f943332042
SHA181d1cc63353a8cd299d296479309fa416963599e
SHA2565050a0636a19270d35b7ac50d4b7cfd1aaec2b966420be411f7c22278c4811fa
SHA512e7ea383b7f36e3c72410b8a00e1569bb485d8cb07eed8421db32020fcd2976dafed8066644e0031156f96c6ad8d01e97fad953e5c6e39afe7b36b530c34f8491
-
Filesize
9KB
MD58ed5614f1ecc12163801e5ea47ff914f
SHA19df60029d8314686621aa87989de3a865110e67b
SHA256b2c4c18eafbe6730f59f3dc8c319f76b8a7d86655a3befecaa180c11e779404c
SHA5120cfa8a378ebde31e2114956ca1f123a623fbc2aa78f6921f4a8d887f896fe7fd4a04ea13565c98565f7641c282cbedc3ff593013e7ca5ffd2fc4de5f4fce7005
-
Filesize
9KB
MD5e51c7c188a8c243cf5329b2231b7031e
SHA1085901cf661c7bab0be9f6fc32e4ee3a4c7ba09d
SHA256de5090f5cca4da9a66447eaa1d77ea03e5535d9e1c1d6a7998cf9bf555d762d6
SHA5120355a73a5241465458f7ebf503e2c9941a3f3d1f6172884d87ef5e7f25575cc63ed75413ad0c3fba46a5578957778a17b7fdd9a9385f58a39a2b9d6542869f19
-
Filesize
9KB
MD5c0106fac6a1c3bf3098543bc1895b2f8
SHA165e8e5f02bbe7460929678143a9595e55ea7e1be
SHA2564a6f42913a2068b47d49c986e778a3bbe516e41686f9332679bb3898e00df3b3
SHA512acb4bc5eab4da7ca3c5eba6059553708c1d38bf40f5d13496c7da6512a4e1f25449cc683f0a472e0cda7d50014e99b3ccda4cef5d397273bd728aeb5ca45181b
-
Filesize
9KB
MD5fe0ab713e05693434f165bdb9968d8d2
SHA192a03446ce3a1fa98a4e1c99c20bd8f66c7a511d
SHA256a11b2f5d29d9eff2a1b670343eae11149c480c0178f0465e3be737c7f0c55dd1
SHA512ef2c89b5b058071a3b1bb56bdec56cc48f9e03b7517c176b2fdb1030fcc98d6fd027a945bff3d37165d642dfd4a4778dbbc6b614839de2e69d3bc63a57dd3bee
-
Filesize
9KB
MD53b5d802611be543231221c3af2fa355b
SHA1f9257d292d119b6cc4dc686e6554c5375921eea7
SHA256756e608b57497a38dca07fc43dc87e0600e122013632c867ce47a22f1644a77b
SHA512916da457498ef025c05930939cb5be47eb520b5a6f0f48ad17c3d2ed75e01cdfc71d442f33037a69ae5aa1ac49bfbdef89abad0d35ec7947a5d1a1ea7324c4c5
-
Filesize
9KB
MD55feecebbff1cb0baacaed940f815b531
SHA1a6a8db7b9d1bcfc2a0c395a0e2185eb98648c0ae
SHA25646e9a0299f8261b7e1c891faa5a6d6c415d94d6d5a811cc002517d06a68d13fc
SHA5127c59a7599bd05c007a14f16f96beabdfaf95cb43ad5864e1b9fb5c6fa69c8ff4a0581a4b6cbb2f660fe53a3ce438ff5240bd19f758a0a2b95abbc3c94c7d9d31
-
Filesize
9KB
MD52d1e1e22288bb23102b8a9d4fb4b0a1f
SHA1a4d72971275fbeff4e1bf533d71969e26b4ebf82
SHA2561eff9648edc583bf33b0ea4b7571d45cd0b6cf6beb8157f8c622dc93b0721b74
SHA512db6d3c8770cf9940e3edd0a8e98d0d52be5a11b61e23b0e33830791f813ab73d1fe4d0afb6054837e4c86f8ff18e91efcffea7f7b55294544dbab2bd053cec69
-
Filesize
9KB
MD5d6392f4e3a910f9457d6627b9520a2c1
SHA1c07a426b2678f5a4b55f303f4bf3f55453101128
SHA256bb2ec644568b47e8dc104db5e591c3e8d3612e542f6f6c2f7f90e0899a770a5d
SHA5124e21290cfc725c5fe7a420160fcdcf5d78cbe2bdcf6e0bd59651f28b623c1aee47e0d644da7b423a9068933e2e8cf5f5d7b325a7a4dd73c4d964b236f03ed1fb
-
Filesize
9KB
MD55354650d20ac072779f6a6e630d9aa6b
SHA1fe69b84ddb0baa14f281bdfc64b33d30a578bec6
SHA256b1a645f6ae5f109cf2617d3ea20acbac6ebf9e8493ec47cdfceab05848823653
SHA512f44f12abab8e0af39b6967f3a623bab2511edb43b28d448a2fa52e7540693b3b781b4b11a0fc8cea54790e4d496cccf3532a808ec4acca06dbaa8d1099def2c2
-
Filesize
9KB
MD5a150aa3fbdff562963bc08758d7f563d
SHA1739dc6a46069f729d2733f35290ae3226bc06fec
SHA256e5e521724ddbe953f2b701477c18c48f3fe25f2b062772eea0ae69a494f19a9e
SHA51221fe7b29dc9633fba148ac0ed803b1247e486f93b410285aa728e304a9d78af0cea1d24364b11446b917bb94d4bd09c87bdb53a60d5995ab1ed6c7650018ff85
-
Filesize
9KB
MD5e1ff62e07d5e4541f7d0378287e0ac06
SHA193fdcc6b32c004271ade66d63b910228c322efbc
SHA2569115950d6b8ce32cb9aae2d19aca6c9eef90788f9907845939035c3529e3fc8e
SHA5127a542d5386e6d79891e88b987a153e48071a1bb0e10fd195599900b0ceb74d0d5111b387d28584ea40cdcea89ae3aa3d7defc587fc45414b517d7a6f4d6a5e05
-
Filesize
9KB
MD529251ddcc58b9f6cc4b38b8652aa8764
SHA1524d6898c9701321c35ed47dc9c6e193fbfab3d7
SHA256a3e241d067ce39fc3cd88345278ad11e69f4ba2f5911885bfe42be6cd3eaef6e
SHA512af185d142298a8239be37be18a3765ebcc390005ce2d499acbf54ca06b9078e029c20313f2f1be44e5f1f037cb4c1cc33bb1fcb6fdc68c07cc7b6e350b671ce9
-
Filesize
9KB
MD5f46a19447d5669e7268cc2d492aaaa32
SHA122c35299262792d8685429c0f5be0d3639fc1de5
SHA256ba6ed85418dcfc0e460bdbd68ba012797a7e4f2831f1ab26794dccd26437fa64
SHA5126dd28dc7e17c472227619e12ee885e8f7e264fd8cd3e8352f3e27ae31de7fce301276b3ab37073de50c451d673499256ce21885a92dceb839264ab084579827b
-
Filesize
9KB
MD50ea768e8c5029601ef47c8059d7c3f0b
SHA16e5e29dc5f7e6090fdc78f278d288e52b9f4ee1a
SHA256504e32c3ac6b2a0f0485f66901817d77be9bda525063dc695a0842549bd7b9d3
SHA5121e919f3277de6d6da7551b5a6d606da9863e75de37f72c73a9c417da1db3d2ac0e5fbfe49f4c3f240b1482a155fd7c1635c50891f98779b9abe1e76d4e2c5217
-
Filesize
9KB
MD574d64724a9c55240ee07ef97371d989e
SHA1a9656e69d78bdbef560abc26ee3a8c5bf9d322dc
SHA256fc10bc38bc662b7b23d4167c8cd5bc8062e5068127be8eda18f54ee2d3930864
SHA512a49a9fedee22e74266e8164ebe27c458982139ac48a3881e0ad8997f459cfbf8a1b2c19c1a9eae67d455483c71ca0e7a62101555552ac747b74ee97dd3dbd941
-
Filesize
9KB
MD5bd2e2ac2a92e01767a5bbfce153f6b7d
SHA1a2fe84ba8732d74730bea24d75d2daf8de855e35
SHA256e1012810a2f954a66a72cfb4c8c9cbdd0df8a24aa6289909aa72df426396fbfb
SHA512159289bf95a23828b801e0c97493b4a075e3e15a2f3901166274de9206d94027cef1ff1e59102815ce2e257bc12230ba5fd418b3dbe178c4d1d4c718e179b3cd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b65efdf0-1f8c-4b2a-a9e6-7560c0a132fc.tmp
Filesize9KB
MD52944307f24c02036a7f0c25df5e492be
SHA10ab93e9758e5c1c6275461b837dca117c3d1d885
SHA2567be4ed8ad7cb6b6a4ffc76ab8ffb0784d53026546868f44f57fe1665b5fa6473
SHA512e7affd74675f551bb59a554245205238cdd818cb26b95d16885cc2f78ebf85fb4082bf4c3ab5648afc90c5285f99d79dcfe108825e33e3eccbf76d05effc8311
-
Filesize
228KB
MD5ec1094762e9a30e778ef38ea5d65c30c
SHA15db00fc885f8bba245e4eac0a604d87c5f1ac1ad
SHA2569775ec7987ffcf1b7fa006337ba9f9e125ddfc505db3c009afaf81cbe661e319
SHA512063470705eff43fb613e2ae72afc76b1e8ac1902db5c73abb6674a010724b04cee4117b5db7b5742ccfe42f8bbbd6b62f9f287cb548cd2c4dac3b569b6ea9fcb
-
Filesize
228KB
MD5d8f4aa21aebd266f021e4f3122e5f279
SHA11bcce7e70fa9b3c29380e11e13b9e57ba41c14b9
SHA256cd51d48456937d2e20d8abf451bb989414e13649d54a954bc378aaa04e2e28df
SHA512cc82b67d753abcce94e36cad065f96443c264745169e3e1ed59946ddffda03a7230a5e79e50685355c5c3fb0a99c7cb81024cf1c8c97836183e630fd4eb98134