Analysis
-
max time kernel
900s -
max time network
897s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
09-02-2025 17:12
Static task
static1
Behavioral task
behavioral1
Sample
corazon.zip
Resource
win10v2004-20250207-en
General
-
Target
corazon.zip
-
Size
41KB
-
MD5
1df9a18b18332f153918030b7b516615
-
SHA1
6c42c62696616b72bbfc88a4be4ead57aa7bc503
-
SHA256
bbd05de19aa2af1455c0494639215898a15286d9b05073b6c4817fe24b2c36fa
-
SHA512
6382ca9c307d66ab7566acf78b1afd44b18b24d766253e1dc1cb3a3c0be96ecf1f2042d6bd3332d49078ffee571cf98869c1284c1d3e5c1c7dc3e4c64f71af80
-
SSDEEP
768:hzyVr8GSKL6O3QOXk/0u3wqOghrFCezL1VFJdbq2QTJTw02Q:hGx8DKXE//ZhhCirFi2cwK
Malware Config
Signatures
-
Downloads MZ/PE file 4 IoCs
flow pid Process 267 2060 Process not Found 144 3248 chrome.exe 221 1344 Process not Found 39 2060 Process not Found -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Crashpad\metadata setup.exe File opened for modification C:\Program Files\Crashpad\settings.dat setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 652 MicrosoftEdgeUpdate.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133835955982934670" chrome.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe 2036 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe Token: SeShutdownPrivilege 3596 chrome.exe Token: SeCreatePagefilePrivilege 3596 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of SendNotifyMessage 42 IoCs
pid Process 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe 3596 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3596 wrote to memory of 1028 3596 chrome.exe 108 PID 3596 wrote to memory of 1028 3596 chrome.exe 108 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3940 3596 chrome.exe 109 PID 3596 wrote to memory of 3248 3596 chrome.exe 110 PID 3596 wrote to memory of 3248 3596 chrome.exe 110 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111 PID 3596 wrote to memory of 1492 3596 chrome.exe 111
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\corazon.zip1⤵PID:2644
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIyIiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDY4MzAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxOTE0Njg3NjAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzAwNTkxMDM3Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xa8,0x124,0x7fffec90cc40,0x7fffec90cc4c,0x7fffec90cc582⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1856,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=1868 /prefetch:22⤵PID:3940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2236,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Downloads MZ/PE file
PID:3248
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2336,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=2316 /prefetch:82⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3300,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:1616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4540,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4048,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4384 /prefetch:82⤵PID:1460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4836,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4728,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:4060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5236,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:2540
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --reenable-autoupdates --system-level2⤵
- Drops file in Program Files directory
PID:2476 -
C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x290,0x294,0x298,0x26c,0x29c,0x7ff715274698,0x7ff7152746a4,0x7ff7152746b03⤵
- Drops file in Program Files directory
PID:1704
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5172,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=244,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3516 /prefetch:82⤵PID:1328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5112,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3364 /prefetch:82⤵PID:4484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=3516,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:3180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5200,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=5044 /prefetch:82⤵PID:4772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=5532,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5392,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=3580,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=5700 /prefetch:12⤵PID:3816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=3392,i,13821765003558298830,13355415029972090456,262144 --variations-seed-version=20250207-050113.109000 --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520B
MD5d7bdecbddac6262e516e22a4d6f24f0b
SHA11a633ee43641fa78fbe959d13fa18654fd4a90be
SHA256db3be7c6d81b2387c39b32d15c096173022cccee1015571dd3e09f2a69b508a9
SHA5121e72db18de776fe264db3052ce9a842c9766a720a9119fc6605f795c36d4c7bf8f77680c5564f36e591368ccd354104a7412f267c4157f04c4926bce51aeeaa1
-
Filesize
215KB
MD52ffbc848f8c11b8001782b35f38f045b
SHA1c3113ed8cd351fe8cac0ef5886c932c5109697cf
SHA2561a22ece5cbc8097e6664269cbd2db64329a600f517b646f896f291c0919fbbef
SHA512e4c037be5075c784fd1f4c64ff6d6cd69737667ec9b1676270e2ed8c0341e14f9d6b92fde332c3d629b53ae38e19b59f05a587c8a86de445e9d65ccfa2bd9c16
-
Filesize
303KB
MD5a7066bc17f211f053d87d238d3b4e764
SHA108a6e4a9baee902ca13bbe3f4fa5f0563aaf5797
SHA25676a7948a78cf32832cb6ed9445ac96c47ed8cac179343d885cb8f7f6f6b2a778
SHA512a3b3b80852cd2802300601096bd8c1b27f2096ae742a2457ea4cc17c806306415eeb0479f66837248601210c09c316235e8b71ac0977cee95a051d08ac1332e5
-
Filesize
768B
MD5a23dfee4526de157c8fc48ad16b4e1e2
SHA1b14c7a3d133cd051eb8fe1c7bff6cf68077901c7
SHA256cbd9ec93e192a57721e6cb0ceb6f15f7693d90d921db22868ab8c3bb030f801b
SHA51231f78b22af68539c5656c2c895e4ec9cdb73b3780c1751c2335e42c64cab65da4001b5e53e34615cbf17a76711da473169ebb753e23e0fe724949cbf5136c44f
-
Filesize
816B
MD5779f0b45e69283922c55bced4e8f8f52
SHA1ee943c7e6d6117852bdf86161eb3b97e330201d1
SHA256cfb89b5e2f6e2bd93243bec644ca4a06172fe8a641287e8b117e929585bac2ed
SHA512d6c97b9ee265346f958de8de55f6e3b62538ee0ddb5ff5706f9fee1f206759e7dbd7878376aa06a4c04d22215ce3b69a9e21fc089bc55d615a0549e31edb314d
-
Filesize
4KB
MD50a5c5c5a31a6ebc7ee0b93a54e92e1c6
SHA148411b38dc921cc188fc9701e5a9d09b98260994
SHA256aa2fcb7e06fdace5c27e0d7c40ac8c4111649301c920d72e80376e7a923589c5
SHA512a58846ec1104443e4af2b4068483f46936424242484f827ef86bd24fba0abfa71d2df498ad579fd1a672e415f89f4f2f5bb91dcd95303a2c4c7f1c524d9f7287
-
Filesize
4KB
MD54c6a4a01bc27feeeb49e3205dc9fe793
SHA1596f4215f2023814f0df48bd16a22cdfebbc7843
SHA2565e3bf6015d3691f50171330ff55997fc32760c26e460553fc45f91995dec3093
SHA5123bc710346117053dc11c47cbea934bfa0b576b034272ec5aefd29656e2ed5dc4922572143ba6005b9d5956b934e2d3a84341dcdced7529562f10ccb6cee7059b
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD50e04f632bf433859196bb7931387db64
SHA1253f6c3c0a2141e9a1b45052720a6eb92fef4347
SHA256911082b60194eeac0fe64ab81a14ce0f675f92616730eb8f590e5d72ddd0f6ab
SHA512344cb588b3b1d9c41a587c4af720af89d6d409b7c9567cdf1f1a2d6a34fde3e9324292c798c8d0739fd398fa3db15117276604bca8b049a5b6b9104cd2967f20
-
Filesize
523B
MD568d8e19a842e88f5508e583ecfde4ad2
SHA19665a408829bab4e4d97e51fa808e4b52b070b00
SHA256fcdeebccaf09ba5cd8f270270a8b68790f492525b3e77b7fdeeeac1c4f296820
SHA512a187bc01b28dcdeea535bd3df06371e315fc8e50204ed483ef57fa10c96af15e7e33d6635c716e2a8046868346eb53e0792cfbb222e4f69ac41954ea74d653f5
-
Filesize
523B
MD58267732a2719aa7215fb44cac0c6bec5
SHA18ffb16fb6093019d3ac4885ad7f9db66cbecef40
SHA256ec916242b25c6c7361c0c4ed8d362d1c8a9eb5c0c1381e0d2f4d0042ed03316e
SHA512403208538f6bc81813d31ba9c7b55572adfd93917892814c15cd48633f79bfec72d2cdd574c0200d87cf3c19c6d560cc300e6f467520b22b76a5389385968265
-
Filesize
523B
MD5d559e1d6103ef6fd3006b87a89f249f6
SHA1a41c85fcd2c6751ef171ebfd6ac5a5faeed4580d
SHA256c138a5b45286c7c6fe33a87c7d01e265563e9f52238e9a6ea93b01183d1dfff0
SHA512f4d5b0503c6b8520beaa6acaa38ef0d3f321c3b77f9754573db1018ad8ab988d154ec8812d9737e4736364060dc740e90ab2b82801705e34c6daabae03b50c58
-
Filesize
523B
MD5875863b2f10de7a17e35ccd589f8615c
SHA165fdc478c16b7827639f702d89d0ce890dfbd957
SHA25676d217121e0c4ed5a619274b3f9a5cb460f13cd238cc2ad4a01efa3ead89d8d0
SHA5126c8241f061e6370185ab5a2240e8bf169bab0addf0d29ba5af38fdd79cc1e698f9ab89e64a957a722ce08dd00869a39b5f9d3518b5c70ee94980619ac29f2f81
-
Filesize
523B
MD599f1bf27c34863c6256d0724dbc41ba9
SHA135fbded7632e88d31e6cee374847894ad6a8bc62
SHA2565d9e1214106b49ff4f4ed2c44c61eed2b0278e14f54998b0af27a39069f56287
SHA512414cb3f8710a51fd7f7fb0edda83a7b9cf7ba2e2916f58d7c93f3f45f8fd983cd680b2a9bd953d02e72a14f5904ed718a7781e63fb8c54f2062595042179aed5
-
Filesize
523B
MD57af1cf7fedd7f71892d2a0b31bc23d74
SHA1abb3e1647000fa9d1d0c7c1f7e1d77b64a379aab
SHA256db65a710676021b051cc78de33c0d18dd10da9cae69fec582f8d2eec88869289
SHA512b25553c0ef8f330c262873356ba0c9077a25a3b080e1012d3502385fd4358144049c0fcf1768260cf247089b9b4c57408ad0782967becabba3daabb8ee8a94ca
-
Filesize
356B
MD5fbf08f960da19ec0de88a45c71d38521
SHA15489c47fed483fd442641febd8b563ccacc83080
SHA2560e1b677efba2626f97606e21c3703a2e29b267413f8383ccfeee9904557b4e82
SHA512e8d1235fec5075a59c7f5879144d86ed3f0ee6f701d2766d88dc9dcf64ce1b145e568bceb825149846495cb828b0be1b4c321065024eac0bfa1f72b0bc46f76f
-
Filesize
523B
MD50c07e2384eb9bfceef58d2c9a688a33c
SHA1d460e00d14bab44dad9c3122ef4109cb78cf4ad6
SHA256710c254705589e4b99eb80905c19cb4ab0113739bf9d0ccb39577b582a1b2329
SHA5128fb4d1350bf3a5e158acf52c543a99a149fae6cb1e6f02eda22583476382313cd2f80b1b86f5877f49a74208cf4e1756edf27371c067fa28e4dea72a651e4bad
-
Filesize
9KB
MD584edb2238125c0d1a30345e350893862
SHA1408a6cd438e697ff2ec68f8481a19b5e8af28a3a
SHA25662767abcc4b91bbe16f0fdd624f6610c95cc6fe561b60a1d0463bce6cb006e3c
SHA512a3bce15c10db22b6e9a21a5415d2b468078de5188ce47a89494d8ccf1802203a80b1b9e7c980bcb930380638107f71195c703951e0d5bafb5ee6ba6f76ec5e4b
-
Filesize
8KB
MD5b2479c6d2472e6af92f55d82246b8139
SHA1aa6be51c134c4d393ec224c42713564c7afa3ab6
SHA2563bf9ec2da36c898d9995ccd1e2af4202ee20445ce5979ab1a736afba39038ddf
SHA51207ec95de7ef6bda53be30d60314d8a53cd3de97bd7b17fd041b5386dcdbb38ee4de0fb67cff6329fc17c7edeb031c67ef9b28f66bc97c2d07d137eb182011193
-
Filesize
9KB
MD5aa54ff133f98758caa096f87a9c6c605
SHA19534ca4d2ce044d63cc9a610e062b68b4245040c
SHA2565216aa021a58208387618dc02c172484cd86751625371928a16e71d3e94a5b6b
SHA51269b03415f9a0f64313b5b64602be626dfa2587dbc253ac029a2a23fc30324bf04c56d56ba9f7d6bab26a6c46705e4e4a56e514c32f577e044969ad42f6f051f0
-
Filesize
8KB
MD56a6208a816419568c767449af602c478
SHA13b8cf6de8ed44ca1d8a48302ec755cc66e68f1cb
SHA256ce2a07583aa883dcdb8cebcfdca1261bcc2cec8f3534e1ee1a02ad5c86ddb02a
SHA512ce8e4580a57a3fd9bb885ce1185d14edf3705f62d4adeeeb003dfadadd442240b1b12d6159d10963e638e308bb81466245d48e077a146bba85a945b5fb3ace69
-
Filesize
12KB
MD5794d33d9b166054809f80c12908449cf
SHA191cc86843bda349bd6f700e17f78096ddc1ffbae
SHA2563a0918eb99088d853e702c6285c5eb89fdd8867d76173aa04db6dee2567c8f20
SHA5121442b913f932d9eb8fe71b2816f057933d0827dc2ff7992de52ed009a6a31c2a3adf157f23ffc781c9e16d877b66249cd83340b5d64b29a1aa966f517948c297
-
Filesize
9KB
MD54a681dfe785ce4cfcdf4d5a387730059
SHA1acaf82255ce62e70b2e92415b1d9b2fd4d2c6bba
SHA2565b3e8e4d0f13e02988c7d637500cb5dbf207333829d80ddb65be6f46fe8e358b
SHA5125224a1c79a5024ee00e4c8f811ad06f847bd1c1e74a2dcc692823fff58e334cec5f7e23ee84d6333926daa603ef41cb1d0bb3c53ce99e44c732a9004a43b07c5
-
Filesize
9KB
MD57cff66fbf06171a695cd3eb15804f8e7
SHA154bd69749baa6707e1987c6932df26f47ead30e1
SHA2565ee329680538ce4789180219f81dc02f69da3bd5903bc6f10e90e008c91839ea
SHA51231e287d7f03a02ed3c07df15b1c022788b632b4d519364848f7b9bd1b3baf4fae4c9754c7e255133c0940f8b8075229df77083f5a834a2ffa8b62320c58064eb
-
Filesize
9KB
MD5a726ccb8ac919ab48db98986109cd4d5
SHA1b27b568ca0d871fd11eb7fea5922ba4605428825
SHA256f0c8a35033fa1448d63a615e4be05fb6650ce63dd65e38a356b0c52acf43c8fa
SHA512d6d1ef66448bf9571ab735454f6cf03470d2dae68d13d0e9fc64cc497d62ab8dd729e037681ad7f9a886fd2fe1480f3ab5b01ed873156115ab0700e6dd7dc900
-
Filesize
9KB
MD5016424c383fff97423448d1cfba567c1
SHA1f9c154dd0a71aa52ccd2ad8ca805ce94b227f9ed
SHA256eea1473d523503939bfaa554bced57c9ae0e69a49631dea882cef65f62f7e8a8
SHA512befc78c62d2ece69a2e95e14764cf8f0cfd212e14164adef95d7d3b1a122e61094c61201e2d792bab401860386c9305271b1125468246c9f33738eeabde9a876
-
Filesize
15KB
MD50a835ff69ea5bea971e4ba9e0ac63d40
SHA19df60c0b6309037ebc561607afa024481f77f940
SHA256f5553f9e2d19b64454ba99b90d24c52bbc5b7ccf7ff9bb488d64b7f7a8d917bd
SHA5122368262fffd5ad8fb4bfa369097c7774403cfa2c8aebd1e4345361065bd25f622b9f2aca30264eeed69de15d71a58c7675ad86fb6b014870b3e742f0fb1042c8
-
Filesize
302KB
MD5d013ab1f4fff8f8e8dc1e13219130dcf
SHA112d964f2511fa0c8ee908b404701014a69b42cb7
SHA2563d4bc40c3bb70aa9223118421ecf8829b20aa335cb0a2ff4bc36d124ac25e89b
SHA5127ffee4610818b985590e9492c9c72592ed41100c7780d20d764ed1c8b9a61281985880ee655d710491e1b01ab31cb56052424ab42bf132167a6fe39069ac663b
-
Filesize
126KB
MD5696ca50d1a185058d0161a4a854713e4
SHA112b1de23cd570c99506432f81cd4e697dcdb8564
SHA256dc8e364f4eb8f4dd746c5d21156198a6cb40a3696633864032ecf1f1da8fa746
SHA5124d14e188bfbdabe75ebdd5a4b9b6052a7ea27acc9d539f84cb5310cd195fd2213617c32d72360d7ca3e3f9ee60600c3289d9fe3bd6e005e6c60cf8d09ecbb5a3
-
Filesize
247KB
MD50177e8c9709b5c4f3433f4c1fee8e7b9
SHA1985e7e5152822473f3c6326becfd2584851e3c76
SHA2560f7a5cbb942ea5f2043f340b032a48aef4f0c464fd80baa6261c5f85b31162f3
SHA512e21a07acd7536284694c18330c7dab6f176364da804707aa16e02ce03d533bc950864fb1ba84271b3bca293c448673c4e5067c1c5edffb064361a427ff8f60b7
-
Filesize
247KB
MD5a3001b72157d80fe82c3cc49a87237b3
SHA16274bd8a86c9f546f4c58b654ac9e2bc0810180e
SHA256f6f498a01c6c19c931748b30dd95fc8ec9d3f3bc0c3a7033cc05d43f3ddc41e4
SHA512d4de8e352a9cdaa03b7994dc509d68e051a993af61ab1acea351c31a26d42a9b9ca93a8840311a7b5d62f37a5ae9256300287be3cadf97750ee8715e31d29d7c
-
Filesize
247KB
MD5fc69aa64851c3ae5ec3816484f0b8811
SHA157fc13337bd28782adec4fb67807c901eabf0d2b
SHA2563bb7f9b6fb654bce21faf0fdcde009d56d52f8c4964f6ca5b20297215f8ec112
SHA5124fdf75a8c1ed20dfad518c691c279c7099f64b33ca7bec581625ed78ad42bd08768297301faf78b2f6b4c0aa76e9e948493555332b02fd69bcb78aa3cfcef9ed