Overview
overview
10Static
static
5My-Skidded...f2.exe
windows10-2004-x64
My-Skidded...Us.vbs
windows10-2004-x64
1My-Skidded...AT.exe
windows10-2004-x64
10My-Skidded...UN.exe
windows10-2004-x64
10My-Skidded...no.exe
windows10-2004-x64
6My-Skidded...MK.exe
windows10-2004-x64
My-Skidded...ck.vbs
windows10-2004-x64
1My-Skidded...it.exe
windows10-2004-x64
7My-Skidded... 2.bat
windows10-2004-x64
7My-Skidded...OR.vbs
windows10-2004-x64
1My-Skidded...ge.exe
windows10-2004-x64
My-Skidded...ck.exe
windows10-2004-x64
10My-Skidded...BR.exe
windows10-2004-x64
My-Skidded...ba.vbs
windows10-2004-x64
1My-Skidded...ad.exe
windows10-2004-x64
My-Skidded...BR.exe
windows10-2004-x64
6My-Skidded...AL.exe
windows10-2004-x64
6My-Skidded...en.exe
windows10-2004-x64
6My-Skidded...in.exe
windows10-2004-x64
6My-Skidded...BR.exe
windows10-2004-x64
My-Skidded...64.exe
windows10-2004-x64
My-Skidded...64.exe
windows10-2004-x64
10My-Skidded...24.exe
windows10-2004-x64
10My-Skidded....0.bat
windows10-2004-x64
7My-Skidded...as.exe
windows10-2004-x64
My-Skidded...ll.bat
windows10-2004-x64
My-Skidded...ks.exe
windows10-2004-x64
My-Skidded...ua.exe
windows10-2004-x64
My-Skidded...kz.bat
windows10-2004-x64
8My-Skidded...BR.exe
windows10-2004-x64
6My-Skidded...UG.exe
windows10-2004-x64
My-Skidded...mi.exe
windows10-2004-x64
6Resubmissions
09/03/2025, 01:58
250309-cdv29swybs 1008/03/2025, 06:55
250308-hp35xatjt9 1008/03/2025, 04:53
250308-fh1ebssky5 10Analysis
-
max time kernel
300s -
max time network
296s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2025, 01:58
Behavioral task
behavioral1
Sample
My-Skidded-malwares-main/6abdd72e82088f5aab90dc9e02f2d9781cea1b3f1c84b3f16df4810956f68ef2.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral2
Sample
My-Skidded-malwares-main/AmongUs.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
My-Skidded-malwares-main/AnaRAT.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
My-Skidded-malwares-main/CRINGE-DO-NOT-RUN.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
My-Skidded-malwares-main/Cirno.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral6
Sample
My-Skidded-malwares-main/DAMK.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
My-Skidded-malwares-main/Dell_Fuck.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral8
Sample
My-Skidded-malwares-main/Discord Expliot Kit.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
My-Skidded-malwares-main/ERROR 2.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral10
Sample
My-Skidded-malwares-main/ERROR.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
My-Skidded-malwares-main/Fello_s_Revenge.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral12
Sample
My-Skidded-malwares-main/Fellos RAT-Pack.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
My-Skidded-malwares-main/KonataMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral14
Sample
My-Skidded-malwares-main/KonoSuba.vbs
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
My-Skidded-malwares-main/MarisaFumoDownload.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral16
Sample
My-Skidded-malwares-main/MarisaMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
My-Skidded-malwares-main/Marlon2210FACEREVEAL.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral18
Sample
My-Skidded-malwares-main/Marlon2210KeyGen.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
My-Skidded-malwares-main/Megumin.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral20
Sample
My-Skidded-malwares-main/NazrinMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
My-Skidded-malwares-main/PCCooker2.0_x64.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral22
Sample
My-Skidded-malwares-main/PCCooker_x64.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
My-Skidded-malwares-main/PanKoza2.0 Discord Token Stealer 2024.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral24
Sample
My-Skidded-malwares-main/RaM KilLEr 1.0.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
My-Skidded-malwares-main/Rias.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral26
Sample
My-Skidded-malwares-main/Run All.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
My-Skidded-malwares-main/TouhouHacks.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral28
Sample
My-Skidded-malwares-main/Trojan.Aqua.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
My-Skidded-malwares-main/Trojan.Bat.FortniteHackz.bat
Resource
win10v2004-20250217-en
Behavioral task
behavioral30
Sample
My-Skidded-malwares-main/UtsuhoMBR.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
My-Skidded-malwares-main/VXUG.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral32
Sample
My-Skidded-malwares-main/YuukaKazami.exe
Resource
win10v2004-20250217-en
General
-
Target
My-Skidded-malwares-main/Megumin.exe
-
Size
585KB
-
MD5
42290305664ed813bfa8ca2e19e95c0c
-
SHA1
d995102a7f80134526c915dd59351628c91fc2f4
-
SHA256
659d0b6efbf8aa8eb49a2e1c6ec9cc5e33f2617a607f2bcf7a70465febbd5744
-
SHA512
8ddf065acab28522f6cde0698b769f4078e167c9bdc1e88f6c0974b21668c07d44e4c83bf7a1863b1837b782213e04e59d07ba2cde6bb34f7f159d1242bec5e5
-
SSDEEP
12288:1Dbpr2trUqUeBhfUHzXC+cHJ8XeSb++MnaT2v0:1DdsrsG5UHulCXR+xaT2
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CustomMBR = "C:\\Users\\Admin\\AppData\\Local\\Temp\\My-Skidded-malwares-main\\Megumin.exe -BypassWarning" Megumin.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 Megumin.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Megumin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133859591998372458" chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4808 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe 5028 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe Token: SeShutdownPrivilege 2304 chrome.exe Token: SeCreatePagefilePrivilege 2304 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe 2304 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 180 Megumin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 180 wrote to memory of 4808 180 Megumin.exe 85 PID 180 wrote to memory of 4808 180 Megumin.exe 85 PID 180 wrote to memory of 4808 180 Megumin.exe 85 PID 2304 wrote to memory of 4592 2304 chrome.exe 90 PID 2304 wrote to memory of 4592 2304 chrome.exe 90 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 4740 2304 chrome.exe 91 PID 2304 wrote to memory of 1904 2304 chrome.exe 92 PID 2304 wrote to memory of 1904 2304 chrome.exe 92 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93 PID 2304 wrote to memory of 1796 2304 chrome.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Megumin.exe"C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Megumin.exe"1⤵
- Adds Run key to start application
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN CustomMBR /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\My-Skidded-malwares-main\Megumin.exe -BypassWarning"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff85ba2cc40,0x7ff85ba2cc4c,0x7ff85ba2cc582⤵PID:4592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1808,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1804 /prefetch:22⤵PID:4740
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2092,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2132 /prefetch:32⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2436 /prefetch:82⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3156 /prefetch:12⤵PID:1536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3396,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3684,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3692 /prefetch:12⤵PID:4128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4756,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:82⤵PID:1436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=5048,i,13365989144335997571,916741202786789431,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:348
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4164
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5ffafc3a89523efa789e20a4239943d77
SHA1f63af3324879a3119a715046b9ac2a862019191c
SHA256676428f5a05e17ea8e959f223370bdac2daebcd20c419f443e4772b8e71a24a2
SHA51253d75d0f7221f0b17488faca4304534a3f4dde2ad57d6f6675b0846c88965dc7ab669d067493449ac80c0fd389dedf546d7d1ea5035cbbe533a4980c9a2583b3
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
9KB
MD59e031db0aca7c28323b2254f591c0694
SHA14e2641c8f6ae27c55dee327fcffe101536eb7968
SHA25637cac243865761edb9b4cdc6be959b073edda01eebda9b498b1070e950621f3d
SHA51245b12c620c5ad46b23cc08e22f4a2535acad44741531cc923821fdaa43cf01332ca082adcab2956d456727bb1e3066194c1faa8e7244a6bff4bf9ad7b52d3dde
-
Filesize
8KB
MD5f9cbd154ce98d15bc6215adc9ddc9983
SHA1eedc67a39ee60e7ad3e979332e6a84b519a015b0
SHA256112ccb5c13da51d97b0be5c4af3e1ec29bb5948a1a3bd027580994ca0e2eba04
SHA512b729b8e230d3e43e45fcababbc3872e04c64a0ad3e4978618032903ad0f64d39815a7c5b37ddff2a33c167b38f27132e156a8bbb38913e0a256f8a266fbbd08c
-
Filesize
9KB
MD553eb26f97f5c75db50812bb40090cda4
SHA1631abdd506d57449138cdab585355a75fc6e3e40
SHA25635c34b55f5a1fca3655ade0de6d7ec7ea7bd06d1f91cc8f80666056c4e92b7a1
SHA512907493b428f83ca4e65ec7407bebaed46eff56d5170882ac7e486a4277382c9589d285d8a53ea2da141652597a4a4a580c109635aa82bb3fc246b8d4f02c69f0
-
Filesize
9KB
MD51429c90b5a09d4a58404a50c3b0f7f09
SHA12ffa308518e99a5ae0b1c0a69c410e64605a56ad
SHA2569139da8ff9c32790e458cb890aac2a3900c6eb4062b6f2b977d2f3201d0da652
SHA5120ab04b16003fff19c60080f663acba1d5fa4f7054a2ceade2c43702122e8fb14b7f79812be1b212170c89234f4be040c02cd1de0928546846101e9c07a7a4f39
-
Filesize
9KB
MD5138a3f8e29514f15cddaccdfc823ee81
SHA149ab84315532f0a5c86c1326c65cd4dac94de980
SHA25661c6bea55cb30def6ccf1614eb4e9886448568dfade036063452fd8dfe0eafa8
SHA5122f2cb2b9c5300a5f6407b270061a28c363fd85301822d4854b197cd087310ec1135a820a99ae1e1d6dd435c25ebb07e0be007ac995b20a38cd170fa97e972e7f
-
Filesize
9KB
MD504c217709eb76c3da3d4e400f30d069f
SHA13761bc2e97ec4ad13067c0a6e9827a3f216f9a53
SHA2560a350640e1413b1bcecf5539b75c93086fb8b2396218112e9ef7e8867fa988a7
SHA5121adf6f720bf1a8ebd38be9e0af71b2612f728cd642ab60f2d0068be763481b12d114cd76b35c5cd12b672a19107842ea01018cc8bf465c27905ba87591d91da7
-
Filesize
9KB
MD53d1534265c5213b15fcfb2ab36681e9f
SHA10ae22adbbe44dc6e22dae527de1074e801c425eb
SHA256e17b661737e4a91e91299cea6104e9e5d68c7f36e3756a186c758356ca829d47
SHA512f8f35929ef9d5f0ad2b1d7d73bfcfd55412d69ed0e2d095081d249ba6cd115fa92d56ffb88071478ac691b2234c168990542fb3eec7b5ece419a6c1755a48d67
-
Filesize
8KB
MD5e1b8bc6ee3c9a43704552f36a27b306c
SHA1da6c8ff327dcbbe718d54d4ea405b8367586e304
SHA256e1c6b98271fe2482f58c166d5c596c24939d7f1d3a46caebcb8349f0511544d6
SHA5120ff83cc3baea53960556d86bece21e3a0db55a007ceaa773d45df4eb51da964b290bef56804a251678acbe9051e0ca57d233803fc85cbe230305f976426e87cf
-
Filesize
9KB
MD5970c7db69af38ac6fad74c39f437329b
SHA176e97ab37823518d18ba20f046058266cd7349df
SHA256d8f87d1aff87b74f2eec27a97c22c86df6b2d3869c4d2ee0d337f53cf56365d0
SHA5120aa0e53eb7e7c2aefbd2a15b74825da8bc5c677305ae514fdd959ae951c60ea42f45cf170a84c963fce4399b8133d7d8a8eff2fdfd8bd79bc864f1f1bc52b60c
-
Filesize
9KB
MD577e870c8a239ca6bb2003b93779dd421
SHA1b0636f80cb1c88f91f532bca1ccafdef20f2d07e
SHA256dd0ac0177bdebab5a3b3e12e95090da4125449fb2e78bf4a4cc75f46170cb64c
SHA5125203b72a543bd2a6e0be23326bb4282937f0529793d0821705ac3f0e1edcd4662f3396fd1a08c0d950159a1191ad05a4e7fd5ed3cd32b826a18139e1a4ba3dd2
-
Filesize
9KB
MD5c0125f13a073532f4ece14055a8b6dc0
SHA1374c1e821ee5a1f7041043d4d2e1a04e66874d42
SHA256598c2ef020860b10440a8c69864eb30d6bea518524db572ac68cf24e4747e026
SHA5129735e5c70f7f5658b96b6df976cb06337417aeb3349bc5f91f1608b3cd77a638273a717bcde8fd9dd147fc7edff74de58e42d24254e2fe099acc2bd4ce1407e3
-
Filesize
123KB
MD511496deb8c2b18db4617a6b070b90b3e
SHA1ab130ae48cd467063e5f735f3c6117770f04f30f
SHA256bf9cdc24ed69b8cdaa3daa2a97711c1646c6c326ce0e6365b31df419facca820
SHA5121a69165e26f06491bbb97cbfccc233b76100c7421958be66dfb4daebe347870fb85e32ebcd226619026f96a4e2d871c85145bc27a37d7b22696787c2107ada8d
-
Filesize
123KB
MD5eac5323979d7649cd87f2bd203888e5f
SHA1213993c069cc9d5934eb1dbd40335ffa01c81679
SHA25609157de1b73392c739f3bee017e38b99d68640d141a204702b2afd483a628bf3
SHA5125b9024e32647b2e18a2baf75c2659490f97234361a2704e66eb8c29b6c912b0532d07a60108f8b4da6211c77431f4f85d189569b9b0abba1961a06402fe018e3