Overview
overview
10Static
static
3Unconfirme...58.zip
windows11-21h2-x64
Xeno-v1.1....re.dll
windows11-21h2-x64
1Xeno-v1.1....ms.dll
windows11-21h2-x64
1Xeno-v1.1....pf.dll
windows11-21h2-x64
1Xeno-v1.1....on.dll
windows11-21h2-x64
1Xeno-v1.1.55/Xeno.dll
windows11-21h2-x64
1Xeno-v1.1.55/Xeno.exe
windows11-21h2-x64
6Xeno-v1.1....s.json
windows11-21h2-x64
3Xeno-v1.1....UI.exe
windows11-21h2-x64
1Xeno-v1.1....g.json
windows11-21h2-x64
6Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....-0.dll
windows11-21h2-x64
1Xeno-v1.1....x.html
windows11-21h2-x64
6Xeno-v1.1....ain.js
windows11-21h2-x64
3Xeno-v1.1....lua.js
windows11-21h2-x64
3Xeno-v1.1....in.css
windows11-21h2-x64
3Xeno-v1.1....ain.js
windows11-21h2-x64
3Xeno-v1.1.....de.js
windows11-21h2-x64
3Xeno-v1.1.....es.js
windows11-21h2-x64
3Xeno-v1.1.....fr.js
windows11-21h2-x64
3Xeno-v1.1.....it.js
windows11-21h2-x64
3Xeno-v1.1.....ja.js
windows11-21h2-x64
3Xeno-v1.1....ex.lua
windows11-21h2-x64
3Xeno-v1.1....ld.lua
windows11-21h2-x64
3Xeno-v1.1....ve.lua
windows11-21h2-x64
3Xeno-v1.1....ut.lua
windows11-21h2-x64
3Analysis
-
max time kernel
899s -
max time network
849s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
13/03/2025, 01:50
Static task
static1
Behavioral task
behavioral1
Sample
Unconfirmed 655458.zip
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
Xeno-v1.1.55/Microsoft.Web.WebView2.Core.dll
Resource
win11-20250218-en
Behavioral task
behavioral3
Sample
Xeno-v1.1.55/Microsoft.Web.WebView2.WinForms.dll
Resource
win11-20250217-en
Behavioral task
behavioral4
Sample
Xeno-v1.1.55/Microsoft.Web.WebView2.Wpf.dll
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
Xeno-v1.1.55/Newtonsoft.Json.dll
Resource
win11-20250217-en
Behavioral task
behavioral6
Sample
Xeno-v1.1.55/Xeno.dll
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
Xeno-v1.1.55/Xeno.exe
Resource
win11-20250217-en
Behavioral task
behavioral8
Sample
Xeno-v1.1.55/XenoUI.deps.json
Resource
win11-20250217-en
Behavioral task
behavioral9
Sample
Xeno-v1.1.55/XenoUI.exe
Resource
win11-20250217-en
Behavioral task
behavioral10
Sample
Xeno-v1.1.55/XenoUI.runtimeconfig.json
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
Xeno-v1.1.55/api-ms-win-crt-convert-l1-1-0.dll
Resource
win11-20250217-en
Behavioral task
behavioral12
Sample
Xeno-v1.1.55/api-ms-win-crt-filesystem-l1-1-0.dll
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
Xeno-v1.1.55/api-ms-win-crt-heap-l1-1-0.dll
Resource
win11-20250218-en
Behavioral task
behavioral14
Sample
Xeno-v1.1.55/api-ms-win-crt-locale-l1-1-0.dll
Resource
win11-20250217-en
Behavioral task
behavioral15
Sample
Xeno-v1.1.55/api-ms-win-crt-math-l1-1-0.dll
Resource
win11-20250217-en
Behavioral task
behavioral16
Sample
Xeno-v1.1.55/api-ms-win-crt-runtime-l1-1-0.dll
Resource
win11-20250217-en
Behavioral task
behavioral17
Sample
Xeno-v1.1.55/api-ms-win-crt-stdio-l1-1-0.dll
Resource
win11-20250217-en
Behavioral task
behavioral18
Sample
Xeno-v1.1.55/api-ms-win-crt-string-l1-1-0.dll
Resource
win11-20250218-en
Behavioral task
behavioral19
Sample
Xeno-v1.1.55/bin/Monaco/index.html
Resource
win11-20250217-en
Behavioral task
behavioral20
Sample
Xeno-v1.1.55/bin/Monaco/vs/base/worker/workerMain.js
Resource
win11-20250217-en
Behavioral task
behavioral21
Sample
Xeno-v1.1.55/bin/Monaco/vs/basic-languages/lua/lua.js
Resource
win11-20250217-en
Behavioral task
behavioral22
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.css
Resource
win11-20250217-en
Behavioral task
behavioral23
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.js
Resource
win11-20250217-en
Behavioral task
behavioral24
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.de.js
Resource
win11-20250217-en
Behavioral task
behavioral25
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.es.js
Resource
win11-20250217-en
Behavioral task
behavioral26
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.fr.js
Resource
win11-20250217-en
Behavioral task
behavioral27
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.it.js
Resource
win11-20250217-en
Behavioral task
behavioral28
Sample
Xeno-v1.1.55/bin/Monaco/vs/editor/editor.main.nls.ja.js
Resource
win11-20250217-en
Behavioral task
behavioral29
Sample
Xeno-v1.1.55/scripts/Dex.lua
Resource
win11-20250217-en
Behavioral task
behavioral30
Sample
Xeno-v1.1.55/scripts/Infinite Yield.lua
Resource
win11-20250217-en
Behavioral task
behavioral31
Sample
Xeno-v1.1.55/scripts/Sine Wave.lua
Resource
win11-20250217-en
Behavioral task
behavioral32
Sample
Xeno-v1.1.55/scripts/Spinning Donut.lua
Resource
win11-20250217-en
General
-
Target
Xeno-v1.1.55/bin/Monaco/index.html
-
Size
164KB
-
MD5
001dcbb8f41cdcbf9b4d1e3a0ed4b2d2
-
SHA1
982a05814546017c40771e59e7677b53d84787e9
-
SHA256
f1d2c52f2803c29585b81d2eff74c56242d27e9619ee6d38081d5604c5bb1951
-
SHA512
9a4eba2a9314b6f5851997e1db0ecfae8e40da3443d8a5f9df933ccf6a4d75fc330888c8d14818326e15b3dec9ae2f5f7e73cd08c3822dd7eb0b2d753c8cd8fa
-
SSDEEP
3072:Nk4J09UmmJv8kBpZaFD48VOAGUWYPjDZlLJbRBiPEP8yKUz2Ojmjr8zM3KP7pblM:64J09BA3pZaFD48VOAGUWYPjdlLJbRBS
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 raw.githubusercontent.com 4 raw.githubusercontent.com -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133863042635470750" chrome.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe 3944 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe Token: SeShutdownPrivilege 4852 chrome.exe Token: SeCreatePagefilePrivilege 4852 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe 4852 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4852 wrote to memory of 2524 4852 chrome.exe 82 PID 4852 wrote to memory of 2524 4852 chrome.exe 82 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 4084 4852 chrome.exe 83 PID 4852 wrote to memory of 3896 4852 chrome.exe 84 PID 4852 wrote to memory of 3896 4852 chrome.exe 84 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85 PID 4852 wrote to memory of 1380 4852 chrome.exe 85
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument C:\Users\Admin\AppData\Local\Temp\Xeno-v1.1.55\bin\Monaco\index.html1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9f420cc40,0x7ff9f420cc4c,0x7ff9f420cc582⤵PID:2524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1804,i,17445830758066174715,15955323095139412813,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1800 /prefetch:22⤵PID:4084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2028,i,17445830758066174715,15955323095139412813,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2104 /prefetch:32⤵PID:3896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2112,i,17445830758066174715,15955323095139412813,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2140 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3064,i,17445830758066174715,15955323095139412813,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3096 /prefetch:12⤵PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3088,i,17445830758066174715,15955323095139412813,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:3412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4488,i,17445830758066174715,15955323095139412813,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4496 /prefetch:82⤵PID:2784
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4744,i,17445830758066174715,15955323095139412813,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4504 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3944
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5b5ad5caaaee00cb8cf445427975ae66c
SHA1dcde6527290a326e048f9c3a85280d3fa71e1e22
SHA256b6409b9d55ce242ff022f7a2d86ae8eff873daabf3a0506031712b8baa6197b8
SHA51292f7fbbcbbea769b1af6dd7e75577be3eb8bb4a4a6f8a9288d6da4014e1ea309ee649a7b089be09ba27866e175ab6f6a912413256d7e13eaf60f6f30e492ce7f
-
Filesize
4B
MD5f49655f856acb8884cc0ace29216f511
SHA1cb0f1f87ec0455ec349aaa950c600475ac7b7b6b
SHA2567852fce59c67ddf1d6b8b997eaa1adfac004a9f3a91c37295de9223674011fba
SHA512599e93d25b174524495ed29653052b3590133096404873318f05fd68f4c9a5c9a3b30574551141fbb73d7329d6be342699a17f3ae84554bab784776dfda2d5f8
-
Filesize
1008B
MD5d222b77a61527f2c177b0869e7babc24
SHA13f23acb984307a4aeba41ebbb70439c97ad1f268
SHA25680dc3ffa698e4ff2e916f97983b5eae79470203e91cb684c5ccd4ff1a465d747
SHA512d17d836ea77aeaff4cd01f9c7523345167a4a6bc62528aac74acde12679f48079d75d159e9cea2e614da50e83c2dcd92c374c899ea6c4fe8e5513d9bf06c01ff
-
Filesize
649B
MD59137d7c89253d43d41f3b799143b2b50
SHA1a314151b008a47dbaf13b74db3f8f553b00824c5
SHA25646850e36de5bd682189f92c29db7d47d826e7e6eede3ca76d83112b96a22e663
SHA512909adc2566339f8ccff185863b3a444fafa8b9f372cc58a4561a0295c0d03a9832209aca30c159e017e4ee9518617635382cec5e3847c077b4b85ad3269d1619
-
Filesize
2KB
MD58ebd697f1f5858109a311d485792586c
SHA1449685fc41da90e6cc6bb5688226097081033744
SHA25642d3c93af2217b01ffc8e6a8b74d524ef0acbb02693bde8fcd434f1dd8b057a6
SHA512f08af331c4f03a8426fbc9ff6047a44f8ed4b2f77250c61414472b464eb9bd9ce34c9b3a6c8c86b10c06bb8543b028dc8c747ec3a26c11d552397d36114d3cd1
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
522B
MD5ebf2c78f3a439b876994010e4164eb9f
SHA103b299221624bfe26d3a46aa50eab51d8d288889
SHA2564dddc7c444602b8017f300163f22d0887ae5d88a23742b2fcd897b45be0758cf
SHA512a8bb95aa8460d1412514658fb4daaa78c9e4cc7080ab2e24b4dc0634b8096cf57cbbb17d8041131bd6e8e37f74c7f1fa10c18537bf5e0a5616619acfbc0a06e1
-
Filesize
8KB
MD57f50fd942d3c562007471a4a3b016476
SHA12a293dacaf708a0a3f398e3431682f6c3c94aa13
SHA256c43cf94b8b10e583a4c59489827fdf639550a4e49ef17f850b02898582d149df
SHA51213fba53490f03ad05265bd4392c85498a35edd6f2c2143c5771819f65e831f5c4ed8711d9b82854f3e61fc4a05b1e472249f80f944cae44d99d15f43453f4b12
-
Filesize
9KB
MD51aaaadf57cfc807fde6affd34ea84c97
SHA125f8c1f3104f14ac1a00ba9476f4c5475ec60dde
SHA2569b6f681b867d3b203913b4c42774b420060f191c5892e56de920a9706d5afbf1
SHA5124fcf09c53bfd28a0aaeea14f8f967a1f87fe7aa3002dc3ffc785541ab683bbc88789cefe7e626245122bcc547ca3ee1eddfbab8371a6d0442fe7a2a97558681c
-
Filesize
9KB
MD54d1fd92a8229f7de5460471647f8dd28
SHA1ad3698d45c8a74e7aa867dead8f367f066b4afbe
SHA256d8df22edffee64b5eda2033c52d97a863d2adce8098440da0781226cd44cfb5b
SHA5128e66d1a7749c1d694b1f3f35e1de217e90a8d71586cb402c562d4e5c639df8bb5f2bc0665d5701104693c21c6c9048bf8a1c95fa2fc6620a42c27aac6b53aca1
-
Filesize
9KB
MD54f0580534c5b32963b0ce2b5c597fbe2
SHA1d8204f7b8723a4bad3da7b918eb422580ffc4ee4
SHA2564606d16bad905159766d42f78cbd3ee5200ba4e8d38c39f9179481d46897e190
SHA5126b4959bbb9be1894ef26c6776a47cc67ab607629529da9b913fe045c993ffd98556c0530cac4a5ee75eec2d778d85ef10a3960243458a8edf49cc2cc91360100
-
Filesize
9KB
MD55ad0f1bdf811f280a21b149e9d57fa6a
SHA13f28a6cf40d25e36d8ca1cbe66d5146e3f771a4a
SHA25621f32e9dbec54f62fabc34cf49c0430786cfdcfd13bf37a2dea1061afd5177cd
SHA512b58542291943fb33b513609c5583d080460dd95e05d7da7a7aec5da55b19d6ef53cd383c009093d61522cbfe6e3016f8c5d79ba0064deaa35e3f3204330fd18c
-
Filesize
8KB
MD52b59d60ba552ca687fc29b7b6e942fa7
SHA15c243b4dd6f4a2d3583d8931a4573b13ee1cb9bb
SHA256bf47e04ae5b1cf68a2c7add04c980d2836ea1ccb5350cb256ff1a7a6d42053e3
SHA5124e971cdcf5e046295999213c6f246293490acd622b22966f7c2eae0df372c7c7843d1470a816250cdba36f4f57a83220409b12a6e26cb2f94a177964a62348d7
-
Filesize
9KB
MD51068e1d47f1148c39def0b5ce4c04a3a
SHA17591957ff4621b9278ff518ec2bfedab626b9c06
SHA25697bc728fa0584a813b27dd2d7df0e0b2543b3910b3c5b8196347a4a05abbfc42
SHA512d644f651a79ff1aef00edfefc3ff7ca566d46bc65e6457f71a88e7bc8c9f28a0edba20fb5b2f52e4fcaf64fdb130926aaa9c6787115a6fe02b8d5fe1293137b3
-
Filesize
9KB
MD5880c831a8463503278c580763f29e4f5
SHA11836fe9cb0fb2dda11ac3d5921a3ad4791cd980c
SHA256a9315265e5a80f24f22f7e3486358e8eaa726d8e1d4e38599a37e1be747eb6ff
SHA512f9f0b241d86949fd91d033dac226f90ab6280de676a0734c91131e863b6b225e0e275c72397a78554bb42babd5e505a052cd3e9e7717995df63234ed5ddadcd0
-
Filesize
9KB
MD5362d45e61b050b559ef60d319509f8ec
SHA1fa66ff01b5fe47f051ee4d80f6c02ae435a8c6d5
SHA256b235b844c89c5806c58bda99cafa94ba525fde75085c8e238d376cac464bd595
SHA512fe35955f693e3be6973f5bb91d6e42f88cb7f8216b4d6a77ce6cb71f348d7bb31d45ce842f98a5ca0ba89ea994e542f45bcbd87e4abc4bd21fa6c2579f1a3303
-
Filesize
9KB
MD54af9ff81049e59c3c8d172cacc0050a7
SHA1cc34f6cd7761fc2546e462d9e1d35fb7c50a5fb8
SHA2566a3c17bda8ef646fecee537c13a2e865ab161c0d88705d00efcfbe3e6c70d8ae
SHA512fbd376d46424020f1dd51273f1abd64d0b6a8aa2d8690ded1a7312bfcac6be7af6e103c7b7196c6c035c9427cadad7ad1581c4ed7beac8e7d27cab920d00bd85
-
Filesize
9KB
MD5d0951de17a4aa604ecedf8b8d4d8daea
SHA18b802440482ad946bf68c2fcf443fda270cd265a
SHA256a02e88b863b8d3faa610a3247fda168e85253a845da020fc8f746de6ea91cf74
SHA5127a7df24c39b51b03122a686111d39c55496c349190c56d084f954125ac599338217b4ab9bfa075967a03b35c39f9fbdefb2aa92e7c3b0c1c486661a9c8172a65
-
Filesize
9KB
MD51e233becf9a5bf6ef54c8b90b8780532
SHA1340ba1ae3c0b2ff940f6fd5e52f84bf7dd8ba4aa
SHA256f2621634d9524a976bf58a409e211cc68867816ddc6bbe125cf44f48f63ffbbf
SHA512043412816122ac732d7778dd540c5449951349459876baa0b0caba1c04ad359522cfb0a14b5e04bb3d02ef0f95f46d0ab46eb75acbc981ee86b43feda3a43b1a
-
Filesize
9KB
MD50bee9ceb76f0663610446a593908ae39
SHA1cea22b32e5ffa4fcc1ac752fcb24e38efe6ecc36
SHA256a1c2158ead13c110858f38dcc0f43e4d1e13e3dfff650cac6de42352756e4215
SHA512056c309a998cda9c5249045d9bf21bcf2e9eebfac01f0cdb7f4783ed1ab057ef28590fefe133bf69815b1d007f52dbac137db1cd035faa94fb0f79321e329d10
-
Filesize
9KB
MD5167be1d812bf7d65d6ccb4158070a0c8
SHA15bbcc624963b5a3a458940c1a127a9d7ba288ced
SHA25619704d5c357bff852d4d182fd944213c2ba6a5c82831aa89fc303d4102195122
SHA5126ed3c89841bba59a50db2eaa197fbe45d0fbfe2dba2e52e53f9f7988dbadd6076d6e8a81ca0035392ca6956a5984efb101fb63dd6339ad1523c681431a585058
-
Filesize
9KB
MD53123565c6a0987e95e137a3da985219c
SHA18f08c7016be1abd34aa8317d8ba7c050ca3f1470
SHA256f64b55077ca8840c5e0a8fd46aec502fb449c8a69117970fdfab7e0ddbcb1a70
SHA51209addd6bcd8cfa1b75afccde3767d73e41f6b608eff927d92abdac9b9404e9d39dd126a7a68a75b8662d68879fe7a34cd1a9a7995ddfe9ecd7bcb24cca172f3e
-
Filesize
9KB
MD5bc8c60a6fcb72c8805b82afc8e7fd2b6
SHA105b171f3e05f6e0c06e92e6c844c2ca66255e5ad
SHA2568e643b03d55d3055d2bf72c2372187134bdb9103887ee228656e37ea58194565
SHA512f86979a2d84e63a62da8715fedfd6cb7b9b7bec342838f0e789fe6f54fc1be9a8a104fbbaf0fed402b1f2d812c67310c23aafcf26a71c7d5124472c807a3ff11
-
Filesize
9KB
MD5ebe9535f12d065b866e992e935a8c739
SHA120480b6b9b90ba36f82655c06199bd553992a20c
SHA2567797f56d1a20600213fd04d1d1887c16a16b3e8b468e7f2e7e8c794320800f2f
SHA51213a267ef0d3b299207ed618252599a8e3ce2c271addfd2f593316d04e1b7a4e7e0468be2042180eca2980d550e734cc9934b3c9274123efa34e747d2db20063b
-
Filesize
9KB
MD5cd23bf689dc2bdff9c05f09d7e2fcaa9
SHA1733c0acffeaa02c86ad0255d8c1f48e00d56f15b
SHA256ed2c67083a8c9e79641b3bbe636576fbd3e99c474c02b6049500776b4181ffc2
SHA512dcab7406afffcc885b8b8b47e5608ce887e110d7beebd02b13bc4926ab52a8d58256b90043b77d7eda00a1f1c9e8120bf674cc353b3dfc79d3ebb6950f60d75d
-
Filesize
9KB
MD51dc3dfff11420195c8314ea5bba0f52c
SHA1904cb7fd8a5c47d0647403b6cf51b76ab4bbde4d
SHA25678acc72bc982256f8143fc57ab8168ee17343f38959131bb4c042b7b693b810f
SHA512fe4b2f79b820d9f8c12ab9b24f28f66915c2b60e0257a0765d1c6e6af0ced6e26f54bbdcd63a499fdfbad5ac1e0129fe529d1c0f9fcb6da48d338a2c7dd0f3e3
-
Filesize
9KB
MD5b41c50cfaaaaf8a234f961a29246fb1c
SHA1eff75b300d9839fe5d771215ef5acf32ae83951a
SHA25613822bae064c175b659f74ebe6ed0cb4acf5ac5eed12ef3a0868b6ab885202fd
SHA512a608461d537758134202d670e6be2d8aa611375309797ac13086d10e5521f9b33e3904a3a9e2d33a67a44a64e73c3d7607bd7b8c70f1afb4952c68a3571f6472
-
Filesize
9KB
MD5a1c17cfd8241e390d7f7170d8c07e910
SHA11554610009c5ceae5d5346c91c573ca54579b98c
SHA2561a0ecb396173ee4a518a3df869b8380c0b8df9473e01980033c08013fe021837
SHA512cbb46e63b697e1fdf669d0e823d19e14ce0d070856cae7d79a743422297f86cd9f1c19e040509426195f855a44998758839cd2e6b40fef00f7fef9fe35fb434a
-
Filesize
9KB
MD589d642051c7b73cde3556665f63574e8
SHA186a329ec872e761ec35f28548edd8a2e2cdc2847
SHA2562f217b061049db996a47c374a9eae280e2679ad6d5835f5bca9df58f63e0f112
SHA51289d7704039f8dcea6d3d837eb528e7e137ca164632ae3b843aebc1a8352a69f424c2255af94beb4a5aa44be493299782e9f462eb9f8b02bb7fb2ff8f1a3aeef1
-
Filesize
9KB
MD5145015b8e3cf08e2d2a0b503d12edcb9
SHA1eb692529162d2e4521e862f4f296192833a271f7
SHA25600daa647c77466f218414a4576f3497707a4e2612625d7af67a2593fa2629fe7
SHA512183aa8ae68d2dd696f0ed91543f8da2f086fdecb8a1553eefca1ba202b434adc3002e58037f01198246616609985e5c1fc46f81586aff1ce8427e0a5a553616a
-
Filesize
9KB
MD5e37d27302212544e1e5d385bd21e44b5
SHA1ef1ee7ab51cc4b2929f2e71a74203da53e2cf482
SHA25605482fa1e0d0a324715dd1613ef0261e281fcef374125428f14b4aebae3f802e
SHA5129c20a693b6eaf3ae4bca4653d93a749287795e978f3eb2411f7f59a295bc81f9d6fc78b51f93daedccc09c8501d06d570ba153018c96364d6f761700cad9273e
-
Filesize
9KB
MD5d4eaa4af522da35a0cea8a0005d2671d
SHA1eae1d672b43f65a97d31c373f148625ed2816106
SHA2566d775ef05602327b3b1f1d6f5c02b39993688c7bf14b70ffe3e87c545c96cec5
SHA51211da4770a6247f090deb12873adb1029894613895091d82df01d63e680c96cf59fe9c4f09560d51cfd06940fb7bea1d6d72369c5e6f7ff3c7a7ff3c23ce19eb7
-
Filesize
9KB
MD5000689bea927298c3c1428c7d77605d8
SHA18607336da5b6ef475b3bbe159c44f8a6324c43e6
SHA25690d7a9cd197b9d9aa1e48721d8528cdcef3b6eb97395e5a882b6afbcc099a812
SHA51259413bbcc120218f52758d0d28c7a5aa034f6ee7fa254ed7500a40ecde4d4d909005b0f40f2bb7e0974e1f83db715212d88d55e8ae6dc01bedfc2d96b3042d19
-
Filesize
9KB
MD522c09083813bd2e7037b93b2fa69cda8
SHA1c5c5400d2c5d7061cf38ccca8f4c75c7e9395951
SHA256657ca8aadcb1cb2541ad18a25f12ccd6e56b7014feb8d15c1d7142631795ac3e
SHA51278bce5a6abcb67f19fca15126c8b3d1e188cc305b01a375b5ef831b16fff988489b38aec42690f768e73526caa1f54d838863bb4f0f3fdc686d3bb44b81be508
-
Filesize
9KB
MD5ac69ca43a52445a5eb2c92d9411564f2
SHA1313849cb44ae6fca12ac816e4eb7f5d1ac69c8ba
SHA256bcf028f5962cec1fae2500a81b753e92ba6b098356ba4d320b48a3da76c9405d
SHA512509f7d5bed0220f188baf009d899ba90cd14eadb7ebce2a7372602d934c413dfd2856e2b1d4c2680a6f62e472a7ef7ab598bf3565dad0ba23cb38407ace59f38
-
Filesize
9KB
MD51e84cb85d922453b73b5fd215965657d
SHA1b31cab2b26b936994f3596983bd3910a5431fed0
SHA256a999ff9b7535c1b318b5cdfe587c2d6f6f24223e8121ef048a32ce2e13f6c27b
SHA512c8c2faf9117159d8ce9bdf88788711f178385258608a53bd0ffbf821bcd5e890254cabbe6a6ccf3eb5a3d8ce97e56ca074f635bf0bbe75564fd47098ef669188
-
Filesize
9KB
MD57173394b31f777e0f64b9be28ce71380
SHA12fe88c339cdde012c2055ff911335c9206d039b4
SHA256200ff95cacf6aa297c2ea13aa81c7434a91d10d15fec0aa05003f5fca2ba8aae
SHA512f6daf2ef4b7c5d2d9c82ad0b08c8400a5e3ead90b092aa8a94477cc60d73970fdca455866bed2a674be82f8999daa1cbd0e5e42e52513e896b8cc624d7f804da
-
Filesize
9KB
MD5f106b5df74da0265d071ba1e516a965a
SHA18c2af9665f9966b32eb0809bbdd8ca8f29381a45
SHA256ccc84a5d771f1bb90ead6113195b136ecf35b76b9eff25b739136ce307c426a9
SHA512ee2d8e0bde36befc90558d3b04360efff0da192275cba1638f1dc4d92c89629d8550fe2205f799c3ca4bd3ed3143c0aa0c9fe909f7762f5178db0c79cae83b01
-
Filesize
9KB
MD5f8f673f089864a8ec041086e9c0c5db9
SHA19c0c02b1b89dfded85bdee45dda9668319a9b335
SHA256ed7f8d68e316275b2e7e23a2a66046656bb2ae547c838fb3358591bc9c3c103d
SHA51244b9f79891e11bfea09f1af148d0ee50b301bb00bd5464459e511ffd39a42ab88a0d4ae2b7f27aa4c07e9bc95c225ca334cbe6d6c37608e696f3abb2780cf5d0
-
Filesize
9KB
MD57dd6c9805f8721d457993ebdcb2316ef
SHA184fdf847f01759b10e3b3b9a5ea85a2f7abd559b
SHA2569bcfd2e3df0b56136d9e90827cc018e403c427812d3db9f0cf874cfff15f94e0
SHA512d64da905d85c98def9a37c1c55b011102b2e6b95fa9f22ca9940f4cf3865d44f0ea9ddebe326c8b42980c1a41a15fafbf1f745e607abc606d2338012435a8e43
-
Filesize
9KB
MD544812cbed53ffbb5143445476d23abe0
SHA1bd94a30aba2e68324c26c4fd0f2b7ee124a41b6a
SHA25671732c90b5ec67df4afa20669742d5a67a4dfb570615005bc995f4896cd6197e
SHA51249b8d91e8a9e84e77d28a6b957359a2462a0500788832079639ac224bee88f173ef73c3be9d205bc839bfdb531023f31ef8c5c63720d6f9d70ffd901b13dd60c
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a491ea68-83ba-4934-9087-bd4cf402551a.tmp
Filesize9KB
MD58dfa52f46fce1f464a69c10be70746a1
SHA1535d27fdc089d94b935976b42d48078840d631e5
SHA25688b32bb30a156cd720aec030b2a3fb003eedb131ff9e6b27c3623f70e17480c3
SHA5126b39b4c8a78003599b3db33666ecaa956f31cd9a9d151902ce14227a6d62cd3f03fc00865133047f1f4af411b6c8eba10bfea2c0d59a42a2568b87c87884ad99
-
Filesize
123KB
MD5387a9f418c99b3a074c4080a3589f0c4
SHA1cb168e87c768a18d36404d9146d5b882c2e97243
SHA2565941bd9d8142f690553c09ef9c1c48743534a9a508f0b5968eb9039a26b35b29
SHA51236452e67c8acb39c0dbb8707ddc92cd50838eb2cdd833d1209dac322cc420570a784fbc9efc96e0c90ae7bb1f5f18d4811a94e1b455bdc57e924e8638830b569
-
Filesize
123KB
MD58a2898c671f114111c3e2394c57d1d08
SHA1d325345232cdab739246fe702160498cafb2643f
SHA25671b2c94b8e47b59006a5d2a1ed270d9631beb7ab5f24a1fa8ba12158c27829a6
SHA512c9651237169961a0b170187b6690b8111cf2d3456a64764ba46db3369f9aee990b453a2753614a169fd86f90899fa5a379018f5fe5e502de9a818be5f5f8b2e6