Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows11-21h2_x64 -
resource
win11-20250313-en -
resource tags
arch:x64arch:x86image:win11-20250313-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/03/2025, 21:21
Static task
static1
General
-
Target
onnxruntime.lib
-
Size
3KB
-
MD5
4a871b6ef6b29e27d80799e6074e909c
-
SHA1
f066d869dd27817bb506f135e9759026dff18842
-
SHA256
060fa208fc39ea7a5e65b238c12831d08a5ac91f85f97c2c152405b00fe1af4b
-
SHA512
70558269b81c55bd8752dac66452e53337bf25db05c752d07871744e5e5db90a30da84e678a17f5cc89003bcb9c461da052a72feb163043c169fde9185386068
Malware Config
Signatures
-
flow pid Process 37 5004 chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133878433215112655" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-167299615-4170584903-1843289874-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 4100 chrome.exe 4100 chrome.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3548 OpenWith.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe Token: SeShutdownPrivilege 2672 chrome.exe Token: SeCreatePagefilePrivilege 2672 chrome.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe 2672 chrome.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe 3548 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2672 wrote to memory of 1020 2672 chrome.exe 84 PID 2672 wrote to memory of 1020 2672 chrome.exe 84 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 4980 2672 chrome.exe 85 PID 2672 wrote to memory of 5004 2672 chrome.exe 86 PID 2672 wrote to memory of 5004 2672 chrome.exe 86 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87 PID 2672 wrote to memory of 2376 2672 chrome.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\onnxruntime.lib1⤵
- Modifies registry class
PID:5500
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3548
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcf95cdcf8,0x7ffcf95cdd04,0x7ffcf95cdd102⤵PID:1020
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1912,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=1908 /prefetch:22⤵PID:4980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1480,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2256 /prefetch:112⤵
- Detected potential entity reuse from brand STEAM.
PID:5004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2376,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=2308 /prefetch:132⤵PID:2376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3532,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:2424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4180,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4208 /prefetch:92⤵PID:1708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4656,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:3348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4776,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4780 /prefetch:142⤵PID:4852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4960,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4964 /prefetch:142⤵PID:1808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5284,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5308 /prefetch:142⤵PID:2004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5348,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5364 /prefetch:142⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5620,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5304 /prefetch:142⤵PID:5332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5340,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5328 /prefetch:142⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5604,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5376 /prefetch:142⤵PID:5364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5688,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5676 /prefetch:142⤵PID:2484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=216,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5716 /prefetch:142⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5760,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5356 /prefetch:142⤵PID:6112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5232,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5388 /prefetch:142⤵PID:5852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5388,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3816 /prefetch:12⤵PID:4116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=4312,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:5420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=3604,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=4668 /prefetch:92⤵PID:3196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=4236,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3588 /prefetch:12⤵PID:3312
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=4652,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=1700,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=5808,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5964 /prefetch:12⤵PID:3200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=4696,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=6068,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=5976 /prefetch:12⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=5816,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=6084 /prefetch:12⤵PID:5272
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1168,i,8763093642253504364,627070666706573775,262144 --variations-seed-version=20250312-184628.452000 --mojo-platform-channel-handle=3636 /prefetch:102⤵
- Suspicious behavior: EnumeratesProcesses
PID:4100
-
-
C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"1⤵PID:5856
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:6088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f6c42b773620ece5ca742e7bc88e354e
SHA15b560c587f054b2a478c0431b7c00d2924ab58da
SHA2567e9411cf931c133d5d559589e7757a100311964683a1c509997935e551947bd3
SHA5125e6521fb5b62a73c19ccc8ca4eae9c73af6afb079c213581aa383e422015a199914a9bd5bb3dd61ec54fee81c2a925a87918406a1e30075023bf57133c1343db
-
Filesize
456B
MD5a4943d3cabca9b729cbbab295f468311
SHA1468b8f32259e3fccdf2e3a8d0460353a5aac6692
SHA256f9203cacefac69cf326f9e049fd9d1fe073bb7f670944de30a0065bc23ac9159
SHA5124567b17bb0d8a0e2371f60f191e99492f91b0b3a9de44c8f4accfa73b95599f8100e059388684dabb79fd3bba3488b09791cffad1a4fc3500e631ed871e1b043
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.90.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
4KB
MD5145d01f155d5a1f69a12990da8d8d4e0
SHA1bca5caadc0e1cc57185f7ab4d61a4f91bb802c7e
SHA25637715bdcefc0148ac270b6290eddb000656361eba32248847cbbfdd407d1cdb5
SHA5126f0a83661598c0656061198f834a169108de38456ef413840d69a5e682e9faae752c0533c72045c85e3fcd14e7a1d1af5c3d2a154907abd3ddcda8cb4f09e97a
-
Filesize
4KB
MD524a3e45625d0f97113297533b8c6932d
SHA19dc3e40211e162f8aeb0e82a9244941f222cb660
SHA256bfba08dd0b8ae1acf9d041f3579af9d3ea5850d720e172fdf50442695c750ece
SHA51238babba3303ddb204134638348d1b975f9e112b92f5ae893ce5335742d465af21cb74801ccc0c1b727ca9451d9ff98a14f0a143e1ebf97ab26e3830afc1ca598
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
11KB
MD54f0e801f6e6d9425a799340fb722db29
SHA13acfd4cbbce9fbffb5724701bcaaa86110adddb0
SHA2563a99ccbba4c61bd6f866e6c2a54018b8b4ca53665f9b9df76bb4ed342fa5c1d2
SHA5120c5f3ff5386ff17fc5db7f23d86d9b743675750fde2f02c2aa7ce7b972390474fcfb9df34a3992cc8df0258ca8de8a02e6fc617740bf9d57ebfe51b9798bf875
-
Filesize
10KB
MD517cd6786b44dc2f6d5ff898aa98730a9
SHA1bac714adbaafec204a39d65e0f4fe33810549c42
SHA256062de5c9e5a4058b2c6b66b6c0499ade92d45249b55ec044ea9c2fb466ff974f
SHA5121ad0a8a729af6edd7040771441eb1d678dc28c3a619991a36c537ce413c2afa63845791f0ae53abeb6533f00d34e885bb92f307c22293b7c45a637bad0d76366
-
Filesize
11KB
MD5fef14c60b9cbec8f63e469695736d871
SHA15ced01400807db3f1f9dce0ab9a9e0444f3630ec
SHA256297799d018a66c2cd1a83372144768fca7eb5db04e5d5fbe3345556d94e71dfe
SHA51241182426a87b699747a5d216b51f26ec9c0aa921f4215c74b29642ffc0b82e3b87dfe659b291c1bab903f5235d701eb30073b3cbe061cd663a64442acea14e65
-
Filesize
11KB
MD5f9bf021e34685f808e5db166d96742c3
SHA1ec449b5dd705f2efacdad7df482e632b212f567c
SHA256263c4a99150439da509f92878d9a7315a02dd3a11e2192e21c09f04944185841
SHA5127789b43f51e9c87850e4dab813f6aea2fa909112fc7b41470e9591cb9ce88887025a95b41856532855288dfa036b4a9e28e85bc11f7e103871ab6cdcfc922cda
-
Filesize
11KB
MD58898b8a0b51d67990a0286a6beeef557
SHA1a115ef4f386ccc51e04301f2fd3fe426c48b69b3
SHA256cd4ed40bc966d3d7c5e0e48434976b29c77d3e906079a0e75ded980819d9e7ee
SHA512256bf4f6f5440f176c31c1ef6b6dbcf12be7b2c42273b9ff07eccae010e9a8169d631fa52d1b5d033d45a0dc41c050a076b329ec7165480ae82585b561605a8d
-
Filesize
10KB
MD5d4a98775dcd179cbcf5b5e83929c6f59
SHA159dfe5fbadfb177d0b7dc3b72a867ddc161a57b4
SHA25609a2275f72c17d7ecb0a3ebfb574dd8d148f9c1e2481cb5a1141b9d9274e1044
SHA512c99923d37a2271012c4a03f8034ac2c7278b014779a162d1ebfc68b0e680091c8faf5a5423106775752bb7509c0b3fff98c806615ec88d405f3ef442268b41b2
-
Filesize
11KB
MD5f5a94ef4bd5eda33b88cae15e07a1fd8
SHA12e1e90f414e47690995898c20d9867bcead23f37
SHA256424ff33b5dd83f8c3679dc68dddd43a708f30e10f2996b43cdab37119fdc40b8
SHA5121c90353acd9a0d742f12ef75d1e9dee86161bd8d6cc44d78cd685f25d978df1c788763f4202d659a505c857fbf69c776e607b87d7ff425a7c229eddf7d066101
-
Filesize
11KB
MD5aa900330906b053ce46b3bc9feb0474b
SHA1b77e9767faad8e243648b5ff589666eb3d7569a5
SHA2568d1f4cdc30105a819b54f1e65f77e77e68ad0c2c86f192ec996ff5dd9931e38f
SHA512bf103f19f31b778fc898c08df3da844019d9ca4dab6466bc80f0024799142a8375519c445a25f84487b2f5a7ccd9eee45c1065226c489019acf3a035cda8b612
-
Filesize
11KB
MD5f262cba062ed43e3825639bd674d50b4
SHA19ec29bb19761bfca70440378bca740d64e71af2e
SHA25678d9fc5342c74b7bb65bae676f387da0e29570acee79bab9dc9d4b105d977411
SHA5125629a649391cb5032e0ac61e106fdbad3627b4c5001cafafac8f478c627defe797157a17097c293589c75b371035b53e09f5825967bdac42f8f04bd30c52a7b2
-
Filesize
18KB
MD568759b165072b58cc11d1612496804df
SHA19eeff32e4e60db695915ee8c3b5a18eded6bb193
SHA256423aeb3adeb61aa2086523027e873cf3644d7075e26995324a5d61282dcf2838
SHA5129ce33e102762c654eb2f0041f9157dcd581e5ed6c9ab7edb991d3995a47886f4c43ef7890b3639aedcd37edb2925a761646e1ff2906da3d59ee3f20d8e80e284
-
Filesize
15KB
MD5eec3707c8cb436ff7311aece87fda8aa
SHA1c6b0ff8025e98d0288824ee608c4ecfc64fa6e86
SHA256eef8ce04455d4b34cb1debb10a7a155a2c48e6301c6f80dc83b9fd21da150cb3
SHA5128d0bff14fcdcca9b101a7e4f418c60bad5d29255d2ea94b17495421c04afa5a0836e2e55be47d9be5d878da7dea0759a222cd4fdf3be6588db8548b7dc6f8d75
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD50a3cddd1e07176291b804972b36f338f
SHA110ff70d6d51f51f11de060de3dd975d24a56135d
SHA2568e254785423a9dd3ad6e93be23476b02ba5d4d0a82cb55fc8eb5c120ed2abf02
SHA5124e29ea74a14b656bf5ef2f24c6e6bae3e1eb39056cf353eeaf6d11d9c0cf13140c391cc44d9656e9408cd0fc7b03a9f3e1493448d04257c1592e48cc0d644316
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD5add3d31dc3349d6e8338757d6015b06b
SHA10df446508837e692ee99a01a7c8fd84b5a5c2599
SHA256e336e97541f27ede1ac66f1ef8911c8f51af150451f36d742c7eaee18e1603d0
SHA5126ff989433ad940337cb403762c3e94670c13cf07db908d95a473c93982af5ab18e505bc70a08f2e1f807d95f3172eb86cb08cd4ed55522e62942cdf2f3fc1970
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57fee2.TMP
Filesize48B
MD5fb3b95ca2c585279bc2b0b12a1e7d12f
SHA178b96ed27f961293c0968db65c2bc8c57f5b044e
SHA256f0c81fcca3ceb1069b501576f273f3abfb8734cb5a218a03a05dcb282113832a
SHA512584767d75c6fd6408879a43396b184f74738e2c4e8e01b1edcbad2d603c49060af377d55385b44bcd3cc295dc7b7ce90d469f0adb00b1410b9bd46376fee47c4
-
Filesize
155KB
MD5b550506fc125c078d7b95af752c5c6cc
SHA1c175eab78bd4b712c3a6fc5d7356b0134f607dc1
SHA2568045152046e1988d3213c55373121046d6b1e200f5018a3cbe76740b9da9c920
SHA5127ecd5262c4e92b9d2080dc0bec0e5c301be5b31a6950d34b81dab19f4853f1b82351e27f532bc651e41206d1cd9009fcc6d075a75e8123d93e882bb1ccf5dd2a
-
Filesize
79KB
MD53b125a48083c724ee7dc42a0042132d0
SHA131d4c7b679a418142df2c63378c7b5ffa0870820
SHA256515b08fe44f3238599daded9bed47864da8c3dd09378dcdbab8dfd70a4616539
SHA51230f2d7857fb72f6e5ae27aaae819833eac6edc3e0e55c4b3b54b7b08d2adccbfddea7967431c5dc05bbebfd474c2eeb2243350aab9314a23a871941300f53d7e
-
Filesize
155KB
MD58bc2093b696cb0b6d60d4843df9651a7
SHA11fa65cc4a58ef2ab9baf9e055b86b0e54d52e43f
SHA2567d91982afbf3ca2f58df93715afb2c2ee3e72b2d19b187223e0b1d13459b7615
SHA512b5de23c095f1df64af4c0a5f8eb3f7f3786ed64c1827ea7929fa621bc95783fe5e05d0b4dec267923c4909d7c204c34680a337f6eca79b7bac72d76bc23c704f
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir2672_1934925891\a28ba6a5-1c44-4089-bae7-5a1efe0d8f22.tmp
Filesize152KB
MD5dd9bf8448d3ddcfd067967f01e8bf6d7
SHA1d7829475b2bd6a3baa8fabfaf39af57c6439b35e
SHA256fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72
SHA51265347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize12KB
MD542c3b7ac4ed5f607b375c20a66bde0fc
SHA119cf6fbfb5262abb505c676eb0a245d1e0a6d78d
SHA256a3e6754c163d620ad769fa7caef45cd6799b6db4f2d1f6458c5347a8206de0c6
SHA5125f2527a8857ea6ef0a92103a117c1005dd87d1089c43e8c362343e1ea7587f4e313ed08ff84242d1e2c10505cf7e987af676d036fc840a558e81b70df4d897a4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize10KB
MD5e6585401b3ee0e02458f7d968581a53a
SHA15ae28b3b4f71bee9aefaf9a7876ae709b84017d7
SHA25698d0e276d406746b79dc695e28344368fd2b58da60c6e14e5247380167c1bd07
SHA512c9ed61b9ec4d82c9556daf40ac819e00b307e92ab21e39465760be9ae2157ad999612195ae6ecad149f176dd8814f7b33bd5658a225b47b3cd02fc7346c677a1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5d696d521de238c3.customDestinations-ms
Filesize8KB
MD50ee91ace111ff9df150e61b47931740e
SHA1f20a6c61a9c66b40e749aeb1b13130db0a2edb38
SHA256cc5e2daf84bc99168490326adf468c42fc07b28f1c4dd30710b53a288f4fd7e0
SHA512124f21d9f765ad501b043b3633bf0d1a0402891f15c22394f5950c4221e0938badb0a2720d595c924061fedfdde4e9e297affab7f46d931e1b35b22643408a41