Overview
overview
10Static
static
3Xeno-v1.1....re.dll
windows11-21h2-x64
10Xeno-v1.1....ms.dll
windows11-21h2-x64
1Xeno-v1.1....pf.dll
windows11-21h2-x64
1Xeno-v1.1....on.dll
windows11-21h2-x64
1Xeno-v1.1.55/Xeno.dll
windows11-21h2-x64
1Xeno-v1.1.55/Xeno.exe
windows11-21h2-x64
6Xeno-v1.1....UI.exe
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....x.html
windows11-21h2-x64
6Xeno-v1.1....ain.js
windows11-21h2-x64
3Xeno-v1.1....lua.js
windows11-21h2-x64
3Xeno-v1.1....ain.js
windows11-21h2-x64
3Xeno-v1.1.....de.js
windows11-21h2-x64
3Xeno-v1.1.....es.js
windows11-21h2-x64
3Xeno-v1.1.....fr.js
windows11-21h2-x64
3Xeno-v1.1.....it.js
windows11-21h2-x64
3Xeno-v1.1.....ja.js
windows11-21h2-x64
3Xeno-v1.1....nls.js
windows11-21h2-x64
3Xeno-v1.1.....ko.js
windows11-21h2-x64
3Xeno-v1.1.....ru.js
windows11-21h2-x64
3Xeno-v1.1....-cn.js
windows11-21h2-x64
3Xeno-v1.1....-tw.js
windows11-21h2-x64
3Xeno-v1.1....der.js
windows11-21h2-x64
3Xeno-v1.1....64.dll
windows11-21h2-x64
1Xeno-v1.1....64.dll
windows11-21h2-x64
1Analysis
-
max time kernel
899s -
max time network
613s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/03/2025, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
Xeno-v1.1.55/Microsoft.Web.WebView2.Core.dll
Resource
win11-20250313-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.55/Microsoft.Web.WebView2.WinForms.dll
Resource
win11-20250313-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.55/Microsoft.Web.WebView2.Wpf.dll
Resource
win11-20250313-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.55/Newtonsoft.Json.dll
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.55/Xeno.dll
Resource
win11-20250313-en
Behavioral task
behavioral6
Sample
Xeno-v1.1.55/Xeno.exe
Resource
win11-20250313-en
Behavioral task
behavioral7
Sample
Xeno-v1.1.55/XenoUI.exe
Resource
win11-20250313-en
Behavioral task
behavioral8
Sample
Xeno-v1.1.55/api-ms-win-crt-convert-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral9
Sample
Xeno-v1.1.55/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral10
Sample
Xeno-v1.1.55/api-ms-win-crt-heap-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral11
Sample
Xeno-v1.1.55/api-ms-win-crt-locale-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral12
Sample
Xeno-v1.1.55/api-ms-win-crt-math-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral13
Sample
Xeno-v1.1.55/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral14
Sample
Xeno-v1.1.55/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral15
Sample
Xeno-v1.1.55/api-ms-win-crt-string-l1-1-0.dll
Resource
win11-20250313-en
Behavioral task
behavioral16
Sample
Xeno-v1.1.55/bin/Monaco/index.html
Resource
win11-20250313-en
Behavioral task
behavioral17
Sample
Xeno-v1.1.55/bin/Monaco/vs/base/worker/workerMain.js
Resource
win11-20250313-en
Behavioral task
behavioral18
Sample
Xeno-v1.1.55/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win11-20250313-en
Behavioral task
behavioral19
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.js
Resource
win11-20250313-en
Behavioral task
behavioral20
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win11-20250313-en
Behavioral task
behavioral21
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.es.js
Resource
win11-20250313-en
Behavioral task
behavioral22
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.fr.js
Resource
win11-20250313-en
Behavioral task
behavioral23
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.it.js
Resource
win11-20250313-en
Behavioral task
behavioral24
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.ja.js
Resource
win11-20250313-en
Behavioral task
behavioral25
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.js
Resource
win11-20250313-en
Behavioral task
behavioral26
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.ko.js
Resource
win11-20250313-en
Behavioral task
behavioral27
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.ru.js
Resource
win11-20250313-en
Behavioral task
behavioral28
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.zh-cn.js
Resource
win11-20250313-en
Behavioral task
behavioral29
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.zh-tw.js
Resource
win11-20250313-en
Behavioral task
behavioral30
Sample
Xeno-v1.1.55/bin/Monaco/vs/loader.js
Resource
win11-20250313-en
Behavioral task
behavioral31
Sample
Xeno-v1.1.55/libcrypto-3-x64.dll
Resource
win11-20250313-en
Behavioral task
behavioral32
Sample
Xeno-v1.1.55/libssl-3-x64.dll
Resource
win11-20250313-en
General
-
Target
Xeno-v1.1.55/bin/Monaco/index.html
-
Size
164KB
-
MD5
001dcbb8f41cdcbf9b4d1e3a0ed4b2d2
-
SHA1
982a05814546017c40771e59e7677b53d84787e9
-
SHA256
f1d2c52f2803c29585b81d2eff74c56242d27e9619ee6d38081d5604c5bb1951
-
SHA512
9a4eba2a9314b6f5851997e1db0ecfae8e40da3443d8a5f9df933ccf6a4d75fc330888c8d14818326e15b3dec9ae2f5f7e73cd08c3822dd7eb0b2d753c8cd8fa
-
SSDEEP
3072:Nk4J09UmmJv8kBpZaFD48VOAGUWYPjDZlLJbRBiPEP8yKUz2Ojmjr8zM3KP7pblM:64J09BA3pZaFD48VOAGUWYPjdlLJbRBS
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 raw.githubusercontent.com 3 raw.githubusercontent.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428 chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\DisplayName = "Chrome Sandbox" chrome.exe Set value (str) \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Moniker = "cr.sb.odm3E4D1A088C1F6D498C84F3C86DE73CE49F82A104" chrome.exe Key created \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Mappings\S-1-15-2-620072444-2846605723-1118207114-1642104096-81213792-2370344205-2712285428\Children chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 3108 chrome.exe 3108 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe Token: SeShutdownPrivilege 4052 chrome.exe Token: SeCreatePagefilePrivilege 4052 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe 4052 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 5844 4052 chrome.exe 78 PID 4052 wrote to memory of 5844 4052 chrome.exe 78 PID 4052 wrote to memory of 1588 4052 chrome.exe 79 PID 4052 wrote to memory of 1588 4052 chrome.exe 79 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 1848 4052 chrome.exe 80 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81 PID 4052 wrote to memory of 2032 4052 chrome.exe 81
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.55\bin\Monaco\index.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83f4bdcf8,0x7ff83f4bdd04,0x7ff83f4bdd102⤵PID:5844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1468,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2108 /prefetch:112⤵PID:1588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2080,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2384,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2540 /prefetch:132⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3228,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4200,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4216 /prefetch:92⤵PID:5064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5144,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5160 /prefetch:142⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5180,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5332 /prefetch:142⤵PID:2924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5408,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5388 /prefetch:142⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5432,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5480 /prefetch:142⤵PID:6080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=4232,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1124 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=on_device_model.mojom.OnDeviceModelService --lang=en-US --service-sandbox-type=on_device_model_execution --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4572,i,2943195561713850788,11171988160865861525,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1528 /prefetch:142⤵PID:1796
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5476
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414B
MD576c6a7bb3de2cbf45eab09d91a2d4e80
SHA10c170c723b2d335b1cf712918619a981cfc5d505
SHA256b0a38e586fe3098ae1d23d0bf50356a3c8997ed5465df3c746c9979d0a21e1f9
SHA512283a62dd95b97da03cdbc12448f2015c135ff38d5d4f1bd9b213664d5c55454164d66aaad9852edd37c0482566b32d5f81bbcf611183c1a932420c91438d474e
-
Filesize
2KB
MD50fda9f45c4f0e12ef4e6deb8f278be1c
SHA1333d517a7dc46385e0f6819c22d94596e01c0a1e
SHA25664b9289ba89cf482a31a902ed7d4d5244962f8d51416e1471614053e20af06bc
SHA51293809d2d1b5a6282ed24b9f9775915f67b3dd3f3dc01ee169e23e92d23dc46559f80c4431acd666b7626a4fed06b1d430c4e768b3da86107d55cbd328bfb95f1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
516B
MD59318789e80e5ceec86d4e4861f88b815
SHA13880451c913f6c64cb0820253eebac4f1f170a90
SHA256dab7054a02c3b2eab6f0710f97106baba11e7dcc11e0a9972799019ac06f29b2
SHA5120c3143a494b033f39f04af311d21fdd53aef12f6765a9e7d804c74ae2533876bea4e75e51871ce0d635828b43c62e1f9870a0d1b62328afbf726b7dcd7bb8548
-
Filesize
9KB
MD5bec48c2b451ce655def3a728bb15f602
SHA160ca96d468bab41c736f182ed89f4cf63ba93138
SHA2563d3824496db8dfc2e8cece23a5114607f5c075242361772cee10740b6f4bf308
SHA5120b61f8d73964f3fd36d19bdbe469503dac560ce46781362b7b02c547adc068bc761d30611a1ec2ad2878cff2868032ec30418a9edafe543d5673d5dad7d82914
-
Filesize
15KB
MD58c767153270134ff67f3dd4ec752018c
SHA142410c9826c5ff96cfdc8163096d903d687da0d2
SHA25625dcc03ab8d06e9b12461e9227bb92a15634b66ebe6760d3a322ef492a4cc7bf
SHA512df952af3cb1514315dec428fe4aae1d8de2d7e2a53a1fa250ae47c5af5f3c1af177ad0a2f34d9eeeb40b073157860d2055b79823a1cb399f51b415b92a7c9739
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD55463be078cd2481f9afda24760282401
SHA146f0add09b1838b5daa60c592f705cbbad662019
SHA2568b069c88c90cb715420232630ae9588797adb7ecf19926ff8b0502a6193ef8a4
SHA5126f7a5234644613d7ca99273e31cbb16bfa5e84624e1399db420928de9041c3b4b9491876ebd986f3736a4ce489d1386c71731ccda86c655978488e1697277922
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe58369b.TMP
Filesize48B
MD58e06f81c42e04dfa99fcf0c1db5508a0
SHA1ac62b46832167657255d8aaabaf92b3cf434ea3a
SHA256fc3abcc7f0391cbe8ba526935096ecd3384684e792c434e08be99148ce0e234b
SHA51270e633ac2858fa92cc0abcbd501ad31574bf4543758f6590d075053e9eaff3ee41b14e1c516563e72d06a83ba0e37277e14c1af6a130e0deed9229e8bf90ab15
-
Filesize
81KB
MD5d5fd9a6ddb66144e08cc18b4cba509e1
SHA1fda74ac1e62e40a641eeeca1f69102fd8b2e8728
SHA2561b671a5d28092fafd262f403df707dfaae4c5aeaf88944f7b3ad56edec2648b9
SHA512f2ea421152dfd46816e92f3d593c4251d18d444df0a4cc7585338def94f3a7e1f43681584e5a71816b51fe0743f7cf5a192cff85f18c22ad16eac002f9414664
-
Filesize
81KB
MD55ea949587011589e113a685861180d8a
SHA1045ea630b16bdcae6c9c4d0e907133773ddb3d39
SHA256811b49d82d419dd00c10ed4c05267842747d42cccbc539e954e4c46601d5c05a
SHA5120e58b402cb54328f6c5edeae30c7104ea984a4a75935ce4540e59d5073d434aeb718976fe3b416f55a075bbddfd7e1c4ad3592bcbdd773225cf3d8f2f1d6e6be
-
Filesize
80KB
MD502960d6a331457becea2693059977560
SHA1af4a2edd10ee1438350a5282d96164eefad93fce
SHA256d59dbaa9e1e6adb2a2aa59f73d761df9dbf6c584fb6ae0fb05ac7891cb77412f
SHA512bf85524879609efc78840f59e09c4979d3e15853e14bb026550095cd0f09ed915131fa108a27e7601fcdd9dc5c5735004e0031976ff6345de41d0fc6aaa81e4d
-
Filesize
81KB
MD5ed1cdc38d73aa6dd3412c7164450d4f4
SHA18504acbbfed535706660217163527b7d61abc168
SHA25651c60576d62b06e279a7c4e965585f33410baa1a05f42517449da536a356d785
SHA512901fe9f42a39ab7e205e97f4eda48a9a8e7b929021b983428b98038144deba9bf108561b4ab8b42c4261cc48c3692cfb7cf10844ea61190eb7fe49f287acb197